What You Don't Log Will Hurt You - Webinar with Jeremy Snyder and John Tobin of Virtual Guardian
You'll find useful content about AI & API security, the cybersecurity landscape, news, events and much more updated regularly here.
We’ve talked before about the importance of logging in your AI and API security posture. But what happens when organizations fail to log their interactions adequately? And what can you do within your own organization to prevent this? Explore all this and more with the latest webinar from FireTail.
If you prefer to be notified of new posts via email, simply subscribe to our blog below.
Ecovac customers in Australia were startled when their vacuums began talking back to them, most notably using racial slurs. This was made possible through remote access and manipulation of the “smart” devices.
Researchers from DataDog recently discovered that hacker groups are targeting Docker Swarm, Kubernetes and SSH servers in one orchestrated attack using Docker API endpoint vulnerabilities.
Web application and service creation platforms rely on APIs for their functionality. However, one such platform, Versa Director, is vulnerable to API attacks and token theft.
Researchers found a new vulnerability that affects KIA systems and could allow anyone remote control over their vehicles using only a license plate.
APIs are everywhere and in every part of our lives. However, in recent years, attackers have been increasingly targeting APIs. So how do you secure an API, and whose responsibility is it?
APIs are used for everything, including dating apps. Feeld, a dating app targeted at multi-person relationships, recently faced an API vulnerability that exposed sensitive data, leaving users unsettled.