Get a Pentest and security assessment of your IT network.

News

Tips & Tricks for Unmasking Ghoulish API Behavior

Security analyst Kent Kent noticed something odd about the devices that were using the mobile application API. He found standard browsers like Firefox and Chrome hitting API endpoints that should only be touched by their mobile-application communication. The only communication that should be touching your mobile application are the mobile applications installed on your users phones. Separate mobile and web domains makes it easier for you to spot malicious behavior. A public crawler on your application fabric is commonly a precursor to traffic from threat actors.”]

Source: https://threatpost.com/unmasking-ghoulish-api-behavior/175253/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin