AI Security

Utility pages
AI Security OverviewAI DiscoveryAI InventoryEliminate Shadow AIAI Security Posture ManagementShift-Left AI SecurityAI Security TestingCentralized AI LoggingComplete AI Audit TrailAI Detection & Response
API Security

Utility pages
API Security OverviewAPI DiscoveryAPI InventoryAPI Security Posture ManagementShift-Left API SecurityAPI Security TestingCentralized API LoggingComplete API Audit TrailAPI Detection & Response
BlogPodcastPricing
Resources
Pages
Sales homePrimary homeAboutPricingPricing singleContactFeaturesFeatures single
BlogBlog postCareersCareers singleIntegrationsIntegrations singleTeam Member single
Utility pages
Start hereStyleguidePassword protected404 Not foundLicensesChangelogBrowse More templates
Start TrialRequest a Demo

The State of AI & API Security 2025 - FireTail's latest report on the evolving AI threat landscape.

Get Report

Cybersecurity

All
OWASP LLM TOP 10
All
AI Security
All
Product
All
A View from the C-Suite
All
Fintech
All
cloud security
All
AI
All
Awards
All
API economy
All
podcast
All
WAF
All
Events
All
Cybersecurity
All
Cyber landscape
All
Company
All
API security
LLM04: Data & Model Poisoning
June 6, 2025

LLM04: Data & Model Poisoning

In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is #4 on the list: Data and Model Poisoning. Read on to learn more…

Read more

When AI Turns Against Us
June 4, 2025

When AI Turns Against Us

Computers going rogue used to be the stuff of science fiction. But in 2025, it is becoming real. Join us in this blog as we investigate some cases where Artificial Intelligence has behaved like it has a mind of its own…

Read more

The Sequential Kill Chain for AI
May 30, 2025

The Sequential Kill Chain for AI

We’ve talked before about Mean Time To Attack, or MTTA, which has grown alarmingly short for new vulnerabilities across the cyber landscape. In this blog, we’ll dive into the “how” and “why” of this…

Read more

Your Mobile Apps May Not Be as Secure as You Think…
May 28, 2025

Your Mobile Apps May Not Be as Secure as You Think…

Cybersecurity risks are too close for comfort. Recent data from the Global Mobile Threat Report reveals that our mobile phone applications are most likely exposing our data due to insecure practices such as API key hardcoding.

Read more

LLM03: Supply Chain
May 21, 2025

LLM03: Supply Chain

The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each risk one by one, how it manifests, and mitigation strategies. This week, we’re focusing on LLM03: Supply Chain vulnerabilities.

Read more

An open letter to FireTail customers about security and data privacy
May 8, 2025

An open letter to FireTail customers about security and data privacy

Our modern “Software as a Service” model is becoming a challenge for cybersecurity teams within large enterprises, as attacks continue to rise in volume and complexity across the cyber realm. Security needs to be a consideration from code to cloud, or any progress we make will be undone just as quickly.

Read more

LLM02: Sensitive Information Disclosure
May 8, 2025

LLM02: Sensitive Information Disclosure

OWASP’s Top 10 for LLM is a good starting point for teams to learn about AI security risks. In this series, we’ll go over each risk and practices to protect against them. Today, we’re tackling LLM02: Sensitive Information Disclosure.

Read more

The New CIS API Security Guide
April 11, 2025

The New CIS API Security Guide

It’s here! The New CIS Guide for API Security provides teams with actionable steps for their own API security postures. API use is skyrocketing with the recent adoption of AI, and security teams are struggling to keep up with the rising threats. That’s where the CIS Guide comes in.

Read more

API Spec Generation: Ensuring Consistency and Security
April 9, 2025

API Spec Generation: Ensuring Consistency and Security

API security is a critical issue, especially with the rise of AI, which runs on APIs. So how do we ensure consistent API security in an age of growing threats? In this blog, we’ll go over one of the most critical enabling aspects of API security: API specifications.

Read more

Enhanced AI Security Capabilities from FireTail
April 8, 2025

Enhanced AI Security Capabilities from FireTail

FireTail’s latest platform update gives customers expanded AI security features and discovery capabilities to better find, document and protect AI initiatives across your organization. Here, we look at what the update covers and the benefits these new features deliver for FireTail customers.

Read more

Prompt Injection: A Deep Dive into OWASP's #1 LLM Risk
April 1, 2025

Prompt Injection: A Deep Dive into OWASP's #1 LLM Risk

In this blog, we are taking a closer look at Prompt Injection, the #1 vulnerability on the OWASP Top 10 list of LLM risks in 2025. Join us in the first of this 10-part series as we examine the root causes of prompt injection, how prompt injection attacks are carried out, and the best methods to avoid them.

Read more

Tomcat RCE Vulnerability Now Exploited in the Wild
March 20, 2025

Tomcat RCE Vulnerability Now Exploited in the Wild

Researchers recently found a vulnerability in Apache Tomcat’s servers that would allow an attacker to commit Remote Code Execution with a single PUT request to a specific API, followed by a GET. And now, this vulnerability is officially being exploited in the wild.

Read more

API Security IS AI Security
March 3, 2025

API Security IS AI Security

Security teams today face a dual challenge: protecting AI systems from external threats while securing the APIs that power them. The reality is clear—if your APIs aren’t secure, neither is your AI.

Read more

OmniGPT’s Massive Alleged Breach…
March 3, 2025

OmniGPT’s Massive Alleged Breach…

A BreachForum user came out claiming to have breached OmniGPT and shared samples of stolen data to back up this claim. Weeks later, researchers are still scrambling to figure out the scope, attack method, and more.

Read more

What We Can Learn from The New Malware Abusing Microsoft
February 18, 2025

What We Can Learn from The New Malware Abusing Microsoft

Today’s cyber landscape is littered with threats, risks, and vulnerabilities. Every week, we are seeing an increase not only in attacks, but also in the methods used to attack. This week, a new family of malware was discovered exploiting Microsoft’s Graph API.

Read more

FireTail Expands with AI Security: A New Era of Protection for AI Integrations
February 12, 2025

FireTail Expands with AI Security: A New Era of Protection for AI Integrations

AI is revolutionizing industries at an unprecedented pace. But as organizations integrate AI into their workflows, they are encountering serious security risks. In fact, 97% of organizations using generative AI have reported security incidents. Traditional security tools are failing to keep up, leaving companies vulnerable to data breaches, adversarial attacks, and compliance risks.

Read more

OpenAI? Also Open to Abuse
January 23, 2025

OpenAI? Also Open to Abuse

In 2025, AI is the biggest advancement in cybersecurity and the talk of all tech-sperts. But as AI continues to develop, we are seeing a surge in not only the benefits, but also the risks of artificial intelligence.

Read more

API Discovery: The Foundation of Security
December 10, 2024

API Discovery: The Foundation of Security

Many security teams are still not aware of all the APIs in their landscape. Read the latest blog from FireTail to learn about the importance of API discovery and how you can discover all the APIs in your landscape today.

Read more

The Secrets of APIs...
November 21, 2024

The Secrets of APIs...

This blog post will answer questions such as: But where do APIs live? And how do they interact? What languages do they use?

Read more

API Security: The Overlooked Threat Now Overshadowing Cloud Misconfigurations
November 20, 2024

API Security: The Overlooked Threat Now Overshadowing Cloud Misconfigurations

The latest blog from the C-suite at FireTail attempts to answer the essential question: “Which is a bigger threat today - cloud misconfigurations or API vulnerabilities?”

Read more

Crossbarking via Chrome Extension
November 14, 2024

Crossbarking via Chrome Extension

Attackers used an attack method known as “crossbarking” via a malicious Chrome extension to inject custom code into the target’s Opera browser.

Read more

Better Off Apart
November 12, 2024

Better Off Apart

In a world of cyber risks, authorization is one of the most critical steps in an API security strategy. However, when it comes to authorization, the C-suite of FireTail believes it is better kept apart.

Read more

Microsoft Sharepoint Vulnerability Disclosure
November 11, 2024

Microsoft Sharepoint Vulnerability Disclosure

Microsoft Sharepoint recently patched vulnerabilities that highlighted the need for highly privileged user access to happen via secure APIs.

Read more

FireTail support for Enhanced Payload Logging For AWS API Gateway V1
November 1, 2024

FireTail support for Enhanced Payload Logging For AWS API Gateway V1

The latest update to FireTail’s platform introduces enhanced logging capabilities for API Gateway V1, offering detailed insights into request and response data, including headers, bodies, and additional metrics.

Read more

FireTail Joins Wiz Integration (WIN) Platform
October 22, 2024

FireTail Joins Wiz Integration (WIN) Platform

Technology Partnership Enables Mutual Customers to Reduce Cloud Risk and Enhance API Security.

Read more

Disclosure: Multiple Vulnerabilities in Granicus eFiling Platform
October 16, 2024

Disclosure: Multiple Vulnerabilities in Granicus eFiling Platform

Granicus, a platform offering government solutions including an efiling platform called eUniversa, was recently discovered to be vulnerable to outside attack.

Read more

Star Health Data Leak: The Call is Coming from Inside the House
October 16, 2024

Star Health Data Leak: The Call is Coming from Inside the House

Star Health suffered a massive data leak via API access. The personal information of millions of victims has been compromised, and worst of all, there may have been an insider who facilitated the breach.

Read more

Ecovacs Hurl Obscenities at Unsuspecting Users
October 15, 2024

Ecovacs Hurl Obscenities at Unsuspecting Users

Ecovac customers in Australia were startled when their vacuums began talking back to them, most notably using racial slurs. This was made possible through remote access and manipulation of the “smart” devices.

Read more

Hackers Exploiting Docker Swarm, Kubernetes, & SSH Servers
October 9, 2024

Hackers Exploiting Docker Swarm, Kubernetes, & SSH Servers

Researchers from DataDog recently discovered that hacker groups are targeting Docker Swarm, Kubernetes and SSH servers in one orchestrated attack using Docker API endpoint vulnerabilities.

Read more

Versa is Vulnerable
October 1, 2024

Versa is Vulnerable

Web application and service creation platforms rely on APIs for their functionality. However, one such platform, Versa Director, is vulnerable to API attacks and token theft.

Read more

New Vulnerability could allow for Remote Takeover of KIAs…
October 1, 2024

New Vulnerability could allow for Remote Takeover of KIAs…

Researchers found a new vulnerability that affects KIA systems and could allow anyone remote control over their vehicles using only a license plate.

Read more

The Problem with APIs
September 26, 2024

The Problem with APIs

APIs are everywhere and in every part of our lives. However, in recent years, attackers have been increasingly targeting APIs. So how do you secure an API, and whose responsibility is it?

Read more

Feeld Dating App API
September 20, 2024

Feeld Dating App API

APIs are used for everything, including dating apps. Feeld, a dating app targeted at multi-person relationships, recently faced an API vulnerability that exposed sensitive data, leaving users unsettled.

Read more

Escalating from Reader to Contributor in Azure API Management
September 19, 2024

Escalating from Reader to Contributor in Azure API Management

APIs can have many different types of security challenges, even those of tech giants such as Microsoft. In this blog, we’ll explore a recent vulnerability that affected Microsoft’s Azure API Management, and explore what that implies for the cloud shared responsibility model

Read more

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare
September 10, 2024

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare

In Wisconsin, nearly a million Medicare users’ personally identifiable information has been exposed as a result of the moveIT breaches of yester-year.

Read more

FireTail Selected for TechCrunch Disrupt’s Startup Battlefield 2024
September 10, 2024

FireTail Selected for TechCrunch Disrupt’s Startup Battlefield 2024

We are thrilled to announce that FireTail has been selected to compete in TechCrunch Disrupt’s prestigious Startup Battlefield 2024! Being part of this prestigious event is an honor and testament to the hard work our team has put into building a cutting-edge API security platform.

Read more

The Challenges of API Logging
August 28, 2024

The Challenges of API Logging

APIs can run almost anywhere, including any type of compute platforms and network infrastructure services on AWS. In this blog, we’ll go over the different types of compute platforms, network infrastructure services, and how they relate to your APIs and API security.

Read more

A View from The C-Suite: The New CIS API Security Guide
August 28, 2024

A View from The C-Suite: The New CIS API Security Guide

FireTail partnered with the Center for Internet Security (CIS) to create an API security community. The end result is the first draft of The CIS API Security Guide, reviewed by cybersecurity experts from around the world before its release. Read more here.

Read more

Selenium Grid Target of Malware Attack
August 2, 2024

Selenium Grid Target of Malware Attack

There is also a massive lack of awareness around APIs and API endpoints. Many developers buy 3rd party software packages without realizing that they contain a variety of APIs with their own unique vulnerabilities.

Read more

APIs and The Phantom Attack Path
July 29, 2024

APIs and The Phantom Attack Path

APIs are a shortcut to the data. They pass through quietly, creating a phantom attack path that flows through all the other layers of protection. And although cybersecurity has come a long way, there still aren’t controls to mitigate these risks.

Read more

Cloudflare’s Application Security Report
July 26, 2024

Cloudflare’s Application Security Report

Cloudflare released its latest Application Security Report, which contained some startling news. They found that nearly 7% of all web traffic is malicious. But what does this really mean?

Read more

Google Cloud Security Threat Horizons Report #10
July 23, 2024

Google Cloud Security Threat Horizons Report #10

Google Cloud Security released an updated Threat Horizons report containing information about the top security risks. Here are our notes from the report.

Read more

Apple Leaks Location Data
July 11, 2024

Apple Leaks Location Data

Some companies position privacy as a key value proposition of their products and services. But that may not always be as true as advertised.

Read more

Cuckoo for CocoaPods
July 10, 2024

Cuckoo for CocoaPods

A researcher at EvaSec recently discovered a vulnerability in the CocoaPods ecosystem that could potentially affect an undetermined (but huge) number of web users.

Read more

MFA Breached via Unauthenticated APIs
July 8, 2024

MFA Breached via Unauthenticated APIs

What happens when the system designed to authenticate you to your online accounts is vulnerable itself? Threat actors recently verified phone numbers for millions of Authy users via an unsecured API endpoint.

Read more

New Cryptomining Campaigns Use Exposed Docker APIs
July 1, 2024

New Cryptomining Campaigns Use Exposed Docker APIs

A new type of API attack has been discovered- and it’s particularly pernicious. The target? Exposed Docker APIs. The objective? Spreading cryptojacking malware.

Read more

FireTail Using FireTail- Eating Our Own Dog Food
June 28, 2024

FireTail Using FireTail- Eating Our Own Dog Food

When Jeremy and I founded FireTail in 2022, our mission was to improve API security for everyone. And that included ourselves.

Read more

Google's GitHub Goof
June 17, 2024

Google's GitHub Goof

Google probably didn’t want this to happen. The tech giant accidentally posted a whole host of sensitive internal documents to GitHub that partly detailed the way the search engine ranks web pages.

Read more

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration
June 13, 2024

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration

Let’s talk about a recent example of an API vulnerability that was exploited to gain access to data within the German government.

Read more

What CISOs Need to Know About API Security in 2024
June 7, 2024

What CISOs Need to Know About API Security in 2024

In this talk, Jeremy will cover key knowledge from the cybersecurity landscape for CISOs in 2024. Tune in to hear valuable insights and takeaways every CISO can apply in their own security posture today. API security is the cornerstone of strong cybersecurity for CISOs.

Read more

Home Access Control APIs Leave Users in Hot Water
May 29, 2024

Home Access Control APIs Leave Users in Hot Water

A lot of our API use happens at home, in places you might not even expect. What happens when these APIs are left vulnerable?

Read more

API Security By Design
May 21, 2024

API Security By Design

API security by design is all about breaking down how security considerations can be brought into the various stages of an APIs lifecycle and simplifying the API security process from the developers’ standpoint.

Read more

Postman Delivering Secrets
April 30, 2024

Postman Delivering Secrets

In February of 2021, Postman launched a public API platform where developers could collaborate to build software. Now in 2024, Postman has the largest collection of public APIs. Naturally, this makes it a prime target for attackers.

Read more

Revisiting Cambridge Analytica in 2024
April 11, 2024

Revisiting Cambridge Analytica in 2024

The Cambridge Analytica Data Scandal led to the collapse of the company, court cases and massive fines for Meta. It highlighted the massive impact that technology was having on society, politics and democracy. Now, almost a decade later, we take a look at how a poorly configured API started it all.

Read more

I was Wrong about Endpoint Security
April 5, 2024

I was Wrong about Endpoint Security

Based on trends in changing compute architectures, it seemed logical that Endpoint Detection and Response companies would shrink their overall install base. Instead, EDR has evolved into Extended Detection and Response.

Read more

The Importance of APIs in FinTech Ecosystems
March 13, 2024

The Importance of APIs in FinTech Ecosystems

Fintech is a growing industry, and with this growth comes data. With data - and the sensitivity of the data in financial services in particular - comes the need to implement security solutions effectively at scale. Thankfully, fintech providers can turn to many readily available solutions to increase their security posture and deliver better, more secure products at scale.

Read more

 API Security in an Era of Open Banking
February 29, 2024

API Security in an Era of Open Banking

Open Banking can best be thought of as a “microservices” approach to banking. It's a powerful concept that enables porting from service to service, and allows consumers to integrate this data with other providers. APIs are at the core and effective API security is a must.

Read more

They Fought the Law (And The Law Won) - API Security, Regulatory Compliance, And Avoiding Massive Fines
February 29, 2024

They Fought the Law (And The Law Won) - API Security, Regulatory Compliance, And Avoiding Massive Fines

The reality is that failing to invest in a proven API security posture might save you dollars in the short-term, but can cost millions in the long-term. We take a look at how increasing regulatory oversight is leading to massive fines.

Read more

Connecting the Dots: API Security for Building Modern Internet Services
February 27, 2024

Connecting the Dots: API Security for Building Modern Internet Services

The modern web is more connected than ever before. The move from monoliths to containerization and microservice-based architectures means API security is a must. In this blog, we look at what it takes to build secure modern internet services.

Read more

There's No AI Without APIs
February 19, 2024

There's No AI Without APIs

Everybody is talking about AI right now. It's the hottest topic in tech. But few people are talking about the APIs that underpin these AI platforms. Here we look at why effective API security is a must for any organization who wants to harness the power of AI.

Read more

Client Spotlight - Tidal Cloud
February 9, 2024

Client Spotlight - Tidal Cloud

FireTail CEO Jeremy Snyder sits down with Philip Rees, CTO at Tidal Cloud to discuss the reasons, roadblocks and rewards of cloud migration as well as how Tidal Cloud uses FireTail to protect its API inventory.

Read more

Leaky Spoutible API Exposes User Data: What Went Wrong?
February 8, 2024

Leaky Spoutible API Exposes User Data: What Went Wrong?

At FireTail, we usually say that two or more things need to go wrong in order for attackers to be successful. So what went wrong with Spoutible's leaky API? Basically, everything.

Read more

API Security in Serverless Computing: Risks and Mitigations
January 18, 2024

API Security in Serverless Computing: Risks and Mitigations

Few technologies have become as ubiquitous in as short a timeframe as serverless computing. Serverless offers both benefits and downsides to API security. However, with proper knowledge of the best practices, we can reap these benefits while mitigating the threats.

Read more

Disclosure: Work Application Vulnerability
January 17, 2024

Disclosure: Work Application Vulnerability

FireTail CTO Riley found a web application vulnerability. He noticed when the app was open, and he had tools open, one of the requests was going to an API instead of a web application.

Read more

Jeremy Snyder of FireTail on the Founder to Founder Podcast
January 5, 2024

Jeremy Snyder of FireTail on the Founder to Founder Podcast

Jeremy Snyder, the CEO and Co-Founder of FireTail, talks to Teja Yenamandra of Gun.io about his entrepreneurial journey, insights on various tech trends and FireTail's mission to secure the world's APIs.

Read more

The worst API ever?
December 22, 2023

The worst API ever?

As we approach the end of the year, it's often the case that we look back and chat with colleagues about the highs and lows of the last twelve months. One such friend recently shared a story with us about the worst API they found in the wild during 2023. Could this be the worst API ever?

Read more

Product Wrap 2023 - A busy year at FireTail
December 21, 2023

Product Wrap 2023 - A busy year at FireTail

2023 has been a transformative year for the FireTail platform. Our engineering teams have delivered countless new features and capabilities that will help you to achieve true protection across all of your APIs. Here are some of the highlights…

Read more

Webinar: The Cyber Landscape Outlook 2024
December 19, 2023

Webinar: The Cyber Landscape Outlook 2024

FireTail CEO Jeremy Snyder hosts an insightful discussion with a panel of cybersecurity experts. Mikko Hypponen, Sounil Yu and Ted Julian shared their thoughts on the emerging threats and cybersecurity trends likely to shape the next 12 months.

Read more

Disclosure: Remote Data Service
December 18, 2023

Disclosure: Remote Data Service

Various APIs belonging to a data service are leaking their Git repositories, at a backend API which contain the APIs' source code.

Read more

DFIR & API Breaches: Why Context Matters
December 5, 2023

DFIR & API Breaches: Why Context Matters

When it comes to investigating and preventing API breaches, context is king. In this piece, we take a look at why application layer visibility is essential to effective digital forensics and incident response.

Read more

Getting Personal: CISOs in the Crosshairs as API Breaches Surge
November 16, 2023

Getting Personal: CISOs in the Crosshairs as API Breaches Surge

With an ever-changing threat landscape, increased regulatory oversight and a desire among authorities to hold individual executives accountable for data breaches, these are tough times for CISOs. And as APIs become the attack vector of choice for bad actors, it’s more important than ever to prioritize effective API security at your organization.

Read more

Disclosure: Financial Application
November 16, 2023

Disclosure: Financial Application

Unauthorized users could gain access to sensitive financial information via an application's API using the data leaked via Github.

Read more

FireTail at SecOps Vision for 2024
November 15, 2023

FireTail at SecOps Vision for 2024

SecOps Vision for 2024, powered by Techstrong Learn, gave industry professionals the opportunity to connect and share security strategies. FireTail CEO, Jeremy Snyder, was pleased to provide the assembled audience with insights into the importance of API security at the intersection of cloud and application security.

Read more

Behavioral Analysis & API Security: After the Fact and Behind the Curve
November 13, 2023

Behavioral Analysis & API Security: After the Fact and Behind the Curve

API security solutions focused on ML/AI pattern recognition analyze behavior ‘out-of-band’ to identify anomalies, reporting issues after the fact. Prone to false positives, this approach also means attackers will have some success before you learn from it. That’s not acceptable.

Read more

 API Gateways: Great for Management but Not for Security
November 13, 2023

API Gateways: Great for Management but Not for Security

Gateways are great, but not for security. API gateways are useful when it comes to API management but they were never designed with security in mind. They can't actively monitor API traffic, they don’t see inside payloads or detect real-time manipulation. They won’t stop most API attacks.

Read more

OpenAI Updates Will Open API Floodgates
November 10, 2023

OpenAI Updates Will Open API Floodgates

Recently announced OpenAI changes mean users will be able to call any API. That’s great for business and the economy but a potential headache for security teams.

Read more

Unsecured APIs are now a Popular Delivery Mechanism in Ransomware Attacks
November 2, 2023

Unsecured APIs are now a Popular Delivery Mechanism in Ransomware Attacks

As they continue to rise in use, APIs are becoming a critical attack surface for ransomware groups.

Read more

 Web Application Firewalls & API Security: Why WAFs Always Fall Short
October 4, 2023

Web Application Firewalls & API Security: Why WAFs Always Fall Short

While Web Application Firewalls, or WAFs, are often touted as a go-to solution for web app security, they frequently fall short – and in many cases, offer little more than an artificial sense of protection that is not backed by actual protection. But why isn’t a WAF good enough? Where do they fall short, and what is the better alternative? Let’s dive a bit deeper.

Read more

FireTail Joins European Cyber Security Organisation
October 2, 2023

FireTail Joins European Cyber Security Organisation

Since 2016, ECSO has been leading the way in European cybersecurity, building upon the foundation left behind by the Public-Private Partnership in Cybersecurity (cPPP). At FireTail, we are excited to be a part of this journey to bring even greater innovation to the European Cybersecurity landscape.

Read more

Disclosure: European Shipping Company
September 24, 2023

Disclosure: European Shipping Company

FireTail researcher Viktor Markopoulos discovered a vulnerability in a European Shipping Company’s APIs that allowed him to download internal files without authentication.

Read more

FireTail Secures SOC 2 Type 2 Certification
September 15, 2023

FireTail Secures SOC 2 Type 2 Certification

At FireTail, we are very pleased to announce that we have achieved SOC 2 Type 2 accreditation. This certification is an important milestone in our ongoing journey to ensure we adhere to the highest industry standards when it comes to data protection and cybersecurity.

Read more

The Complex Connections between Generative AI and API Security
September 14, 2023

The Complex Connections between Generative AI and API Security

APIs and Artificial Intelligence are two of the most important developments in tech of the last 10 years. In this post, we look at the dual impacts that connect these two hot topics that make our online worlds work.

Read more

Unlimited airline miles courtesy of Points.com’s insecure APIs
September 6, 2023

Unlimited airline miles courtesy of Points.com’s insecure APIs

Poorly secured APIs at Points.com resulted in serious vulnerabilities that could have exposed the loyalty programs of some of the world’s best-known airlines and hospitality brands.

Read more

CYFIRMA & FireTail: Working Together for Complete Visibility and Robust API Security
September 1, 2023

CYFIRMA & FireTail: Working Together for Complete Visibility and Robust API Security

FireTail is proud to announce our partnership with CYFIRMA, a leading provider of external threat management solutions.

Read more

Moovit API Vulnerability - letting attackers move free of charge
September 1, 2023

Moovit API Vulnerability - letting attackers move free of charge

During Defcon, a security researcher presented his findings from assessing a global transportation system, leveraging APIs.

Read more

moveIT - a series of breaches, all enabled by APIs
August 25, 2023

moveIT - a series of breaches, all enabled by APIs

A file transfer software called moveIT experienced a vulnerability starting in mid-2023 that created a mass breach across many organizations and geographies. The breach is started by injection against an API administrative endpoint, and data is exfiltrated via administrative API calls.

Read more

IDOR Attacks and the Growing Threat to Your API Security
August 22, 2023

IDOR Attacks and the Growing Threat to Your API Security

A recent advisory has highlighted the increasing threat posed by IDOR vulnerabilities. In this article, we explain Insecure Direct Object Reference (IDOR) attacks, explore their rise, and examine how these vulnerabilities impact API security.

Read more

API Security: Bridging the Gap Between Application and Security Teams
August 15, 2023

API Security: Bridging the Gap Between Application and Security Teams

There’s a big API security problem most organizations need to address. It’s the gap that emerges between application and security teams. Here we look at what it takes to keep application and security teams on the same page when it comes to APIs.

Read more

Cybersecurity Maturity and Why Your API Security is Lagging Behind
July 19, 2023

Cybersecurity Maturity and Why Your API Security is Lagging Behind

A cybersecurity maturity model (CMM) provides an effective framework for optimizing your security posture. But, when it comes to API security, even sophisticated organizations will find that they still have a lot of work to do.

Read more

Listen by Jean Ginzburg - API Security and FireTail.io
May 22, 2023

Listen by Jean Ginzburg - API Security and FireTail.io

Jeremy Snyder, founder and CEO of FireTail.io, a leading cloud security & cybersecurity company. Discover the crucial importance of API security in today's cloud-based world.

Read more

Secure Talk Cybersecurity Podcast: API Security Challenges & Solutions
May 2, 2023

Secure Talk Cybersecurity Podcast: API Security Challenges & Solutions

Jeremy Snyder introduces several best practices for securing APIs and the various apps that they connect with.

Read more

Risk Management Show: API Security
May 1, 2023

Risk Management Show: API Security

Jeremy Snyder talks about his experience with APIs, API security, and shares some tips, common mistakes, and more!

Read more

Ask a CISO Podcast: Threat Modeling with Adam Shostack
April 13, 2023

Ask a CISO Podcast: Threat Modeling with Adam Shostack

In this episode of the Ask a CISO podcast, we talk about threat modeling with guest Adam Shostack.

Read more

Introduction to REST API Security
April 5, 2023

Introduction to REST API Security

The sheer number of APIs presents a challenge when it comes to ensuring that they operate correctly, efficiently, and above all, securely.

Read more

Ask a CISO Podcast: Exploring the Challenges of Application Security
March 15, 2023

Ask a CISO Podcast: Exploring the Challenges of Application Security

In this episode of the Ask a CISO podcast, we talk about application security with guest Tanya Janca.

Read more

Ask a CISO Podcast: The Benefits of Threat Modeling
March 8, 2023

Ask a CISO Podcast: The Benefits of Threat Modeling

After a brief hiatus, we are back with Season 3 of the Ask A CISO podcast. There are quite a few things we are doing differently this season (details below), but first, let's welcome our first guest for the new season: Fausto Lendeborg, Co-Founder and Chief Customer Officer of Secberus, and learn more about his start in cybersecurity, DDoS attacks, dealing with alert fatigue, and understanding what IaC, SaC, and PaC are.

Read more

Ask a CISO Podcast: AI & ML in Cybersecurity
March 1, 2023

Ask a CISO Podcast: AI & ML in Cybersecurity

Join us on this episode of the Ask A CISO podcast as we discuss AI and ML in cybersecurity with Diana Kelley, CISO and co-founder of Cyberize. With International Women's Day in a week, we also look at the challenges of recruiting women and diversity in the tech sphere.

Read more

API Security Breaches: Areas of High Concern
February 28, 2023

API Security Breaches: Areas of High Concern

As attackers become more knowledgeable about different APIs, they can exploit these weaknesses to gain access to sensitive information or execute malicious code on vulnerable systems.

Read more

Ask a CISO Podcast: AI and the Future of Mobile Security
February 21, 2023

Ask a CISO Podcast: AI and the Future of Mobile Security

On this podcast episode, we learn about mobile security from Amit Modi, the Chief Technology Officer (CTO) and CISO of Movius Interactive Corporation, a leading global provider of cloud-based secure mobile communications software. The company helps enterprises deliver better engagement for their clients., and connect with their customers in more convenient, cost-effective, and compliant ways.

Read more

Ask a CISO Podcast: Understanding DSPM & CSPM for Optimal Data Security
February 7, 2023

Ask a CISO Podcast: Understanding DSPM & CSPM for Optimal Data Security

On this episode, we had the opportunity to speak to Tyler Young, the CISO at BigID, a leading modern data security vendor that helps organizations with their data security, privacy, compliance, and governance.

Read more

Pages
  • Home
  • AI Security
  • API Security
  • About
  • Contact
  • Blog
  • Resources
  • AI Incident Tracker
  • API Data Breach Tracker
  • Open Source
  • Documentation
  • Integrations
  • Changelog
  • Careers
Follow us
  • 
    LinkedIn
  • 
    YouTube
Certification & Awards
AICPA SOC 2 TYPE 2Cybertech 100 2023Blackhat Startup Spotlight Finalist
Get the FireTail newsletter
Stay informed about FireTail and API security

Copyright © 2021-2025 | FireTail Inc & subsidiaries, DBA FireTail (TM) at FireTail.io | Privacy Policy | Terms of Service | Responsible Disclosures

This site uses cookies

By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Got it!