API Manipulation and Injection Attacks | Build a More Secure API With These Vulnerabilities in Mind

preview_player
Показать описание
In the third and penultimate video of this series, Mike Elissen, Sr. Developer Advocate at Akamai and expert in cybersecurity, dives deeper into API Manipulation. Learn about common ways hackers will try to exploit your API microservices by manipulating requests and data that can cause all sorts of issues for your business.

Chapters:
0:00 - Introduction
0:24 - Broken Level Function Authorization
2:42 - Injection Attacks
4:29 - Mass Assignment
6:11 - Conclusion

#Linode #Akamai #APIs #cybersecurity #APImanipulation
Product: Linode, Akamai, API Security; Mike Elissen;
Рекомендации по теме
Комментарии
Автор

This is exactly what I keep dealing with. It's like they Mami and daddy fake parent all my devices I keep buying trying to outrun this bs. And anything I keep trying is like they already know and stop me right before I can do anything . And of course. I'm on my own. Can't get any real help or advice what so ever

exeyeveennersection
Автор

I code in C ...
This is web stuff ...

xr.spedtech
welcome to shbcf.ru