<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security June 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 12 Apr 2026 21:37:09 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1596111</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Jul 2018 08:54:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1596111</guid>
		<description><![CDATA[Two Arrested for Hacking 700,000 Accounts
https://www.securityweek.com/two-arrested-hacking-700000-accounts

Russian law enforcement this week said two individuals were arrested for compromising accounts of loyalty program members from popular websites.

The unnamed cybercriminals allegedly compromised around 700,000 accounts from companies such as PayPal, Ulmart, Biglion, KupiKupon, Groupon, and others. They are also said to have put 2,000 of these accounts up for sale for $5 each. 

“The detainees admitted on the spot that they had earned at least 500,000 rubles. However, the real amount of damage remains to be determined,” Group-IB, which aided with the investigation, says.]]></description>
		<content:encoded><![CDATA[<p>Two Arrested for Hacking 700,000 Accounts<br />
<a href="https://www.securityweek.com/two-arrested-hacking-700000-accounts" rel="nofollow">https://www.securityweek.com/two-arrested-hacking-700000-accounts</a></p>
<p>Russian law enforcement this week said two individuals were arrested for compromising accounts of loyalty program members from popular websites.</p>
<p>The unnamed cybercriminals allegedly compromised around 700,000 accounts from companies such as PayPal, Ulmart, Biglion, KupiKupon, Groupon, and others. They are also said to have put 2,000 of these accounts up for sale for $5 each. </p>
<p>“The detainees admitted on the spot that they had earned at least 500,000 rubles. However, the real amount of damage remains to be determined,” Group-IB, which aided with the investigation, says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1596109</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Jul 2018 08:52:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1596109</guid>
		<description><![CDATA[Facebook App Exposed Data of 120 Million Users
https://www.securityweek.com/facebook-app-exposed-data-120-million-users

A recently addressed privacy bug on Nametests.com resulted in the data of over 120 million users who took personality quizzes on Facebook to be publicly exposed.

Patched as part of Facebook’s Data Abuse Bounty Program, the vulnerability resided in Nametests.com serving users’ data to any third-party that requested it, something that shouldn’t normally happen. 

Facebook launched its Data Abuse Bounty Program in April, as part of its efforts to improve user privacy following the Cambridge Analytica scandal. The company also updated its terms on privacy and data sharing, but also admitted to tracking people over the Internet, even those who are not Facebook users.]]></description>
		<content:encoded><![CDATA[<p>Facebook App Exposed Data of 120 Million Users<br />
<a href="https://www.securityweek.com/facebook-app-exposed-data-120-million-users" rel="nofollow">https://www.securityweek.com/facebook-app-exposed-data-120-million-users</a></p>
<p>A recently addressed privacy bug on Nametests.com resulted in the data of over 120 million users who took personality quizzes on Facebook to be publicly exposed.</p>
<p>Patched as part of Facebook’s Data Abuse Bounty Program, the vulnerability resided in Nametests.com serving users’ data to any third-party that requested it, something that shouldn’t normally happen. </p>
<p>Facebook launched its Data Abuse Bounty Program in April, as part of its efforts to improve user privacy following the Cambridge Analytica scandal. The company also updated its terms on privacy and data sharing, but also admitted to tracking people over the Internet, even those who are not Facebook users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595995</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 09:33:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595995</guid>
		<description><![CDATA[Typeform Announces Breach After Hacker Grabs Backup File
https://www.bleepingcomputer.com/news/security/typeform-announces-breach-after-hacker-grabs-backup-file/

Barcelona-based online survey and form building service Typeform announced a data breach today after an unknown attacker downloaded a backup file containing sensitive customer information.

The backup file contained data gathered by Typeform customers through surveys and online forms up until May 3, 2018.

The company said the incident happened after the attacker exploited a vulnerability, yet it did not reveal what vulnerability that was. Typeform did say they plugged the security hole.

Server flaw plugged in 30 minutes]]></description>
		<content:encoded><![CDATA[<p>Typeform Announces Breach After Hacker Grabs Backup File<br />
<a href="https://www.bleepingcomputer.com/news/security/typeform-announces-breach-after-hacker-grabs-backup-file/" rel="nofollow">https://www.bleepingcomputer.com/news/security/typeform-announces-breach-after-hacker-grabs-backup-file/</a></p>
<p>Barcelona-based online survey and form building service Typeform announced a data breach today after an unknown attacker downloaded a backup file containing sensitive customer information.</p>
<p>The backup file contained data gathered by Typeform customers through surveys and online forms up until May 3, 2018.</p>
<p>The company said the incident happened after the attacker exploited a vulnerability, yet it did not reveal what vulnerability that was. Typeform did say they plugged the security hole.</p>
<p>Server flaw plugged in 30 minutes</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595993</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 09:32:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595993</guid>
		<description><![CDATA[Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses
https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-monitors-23-million-bitcoin-addresses/

While cryptocurrency has seen tremendous growth over the past year, sending cryptocoins still requires users to send the coins to long and hard to remember addresses. Due to this, when sending cryptocoins, many users will simply copy the address into memory from one application and paste it into another application that they are using to send the coins.

Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this. This type of malware, called CryptoCurrency Clipboard Hijackers, works by monitoring the Windows clipboard for cryptocurrency addresses, and if one is detected, will swap it out with an address that they control. Unless a user double-checks the address after they paste it, the sent coins will go to an address under the attackers control instead the intended recipient.

This infection was spotted as part of the All-Radio 4.27 Portable malware package that was distributed this week.]]></description>
		<content:encoded><![CDATA[<p>Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses<br />
<a href="https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-monitors-23-million-bitcoin-addresses/" rel="nofollow">https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-monitors-23-million-bitcoin-addresses/</a></p>
<p>While cryptocurrency has seen tremendous growth over the past year, sending cryptocoins still requires users to send the coins to long and hard to remember addresses. Due to this, when sending cryptocoins, many users will simply copy the address into memory from one application and paste it into another application that they are using to send the coins.</p>
<p>Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this. This type of malware, called CryptoCurrency Clipboard Hijackers, works by monitoring the Windows clipboard for cryptocurrency addresses, and if one is detected, will swap it out with an address that they control. Unless a user double-checks the address after they paste it, the sent coins will go to an address under the attackers control instead the intended recipient.</p>
<p>This infection was spotted as part of the All-Radio 4.27 Portable malware package that was distributed this week.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595992</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 09:26:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595992</guid>
		<description><![CDATA[Video: Analyzing XPS Files
https://isc.sans.edu/forums/diary/Video+Analyzing+XPS+Files/23820/]]></description>
		<content:encoded><![CDATA[<p>Video: Analyzing XPS Files<br />
<a href="https://isc.sans.edu/forums/diary/Video+Analyzing+XPS+Files/23820/" rel="nofollow">https://isc.sans.edu/forums/diary/Video+Analyzing+XPS+Files/23820/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595991</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 09:25:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595991</guid>
		<description><![CDATA[Researchers Devise Rowhammer Attacks Against Latest Android Versions
https://www.securityweek.com/researchers-devise-rowhammer-attacks-against-latest-android-versions

A team of researchers from universities worldwide have devised a new set of DMA-based Rowhammer attacks against the latest Android OS, along with a lightweight defense to prevent such attacks on ARM-based devices.

Rowhammer is a vulnerability impacting dynamic random-access memory (DRAM) chips that can be abused to gain kernel privileges on Linux systems. Discovered in 2012 but documented only in 2014, the bug can also be exploited remotely using JavaScript or via graphics processing units (GPUs).

Last year, researchers from Graz University of Technology, the University of Pennsylvania (and University of Maryland), and University of Adelaide revealed a series of attack methods able to bypass existing defenses against Rowhammer.

In a research paper (PDF), they also propose GuardION, lightweight defenses that mitigate Rowhammer exploitation on ARM systems by isolating DMA buffers with DRAM-level guard rows.

https://vvdveen.com/publications/dimva2018.pdf]]></description>
		<content:encoded><![CDATA[<p>Researchers Devise Rowhammer Attacks Against Latest Android Versions<br />
<a href="https://www.securityweek.com/researchers-devise-rowhammer-attacks-against-latest-android-versions" rel="nofollow">https://www.securityweek.com/researchers-devise-rowhammer-attacks-against-latest-android-versions</a></p>
<p>A team of researchers from universities worldwide have devised a new set of DMA-based Rowhammer attacks against the latest Android OS, along with a lightweight defense to prevent such attacks on ARM-based devices.</p>
<p>Rowhammer is a vulnerability impacting dynamic random-access memory (DRAM) chips that can be abused to gain kernel privileges on Linux systems. Discovered in 2012 but documented only in 2014, the bug can also be exploited remotely using JavaScript or via graphics processing units (GPUs).</p>
<p>Last year, researchers from Graz University of Technology, the University of Pennsylvania (and University of Maryland), and University of Adelaide revealed a series of attack methods able to bypass existing defenses against Rowhammer.</p>
<p>In a research paper (PDF), they also propose GuardION, lightweight defenses that mitigate Rowhammer exploitation on ARM systems by isolating DMA buffers with DRAM-level guard rows.</p>
<p><a href="https://vvdveen.com/publications/dimva2018.pdf" rel="nofollow">https://vvdveen.com/publications/dimva2018.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595881</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 15:39:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595881</guid>
		<description><![CDATA[Ransomhack; a new attack blackmailing business owners using GDPR
https://www.digitalmunition.me/2018/06/ransomhack-new-attack-blackmailing-business-owners-using-gdpr/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+digitalmunition%2FUHtl+%28DigitalMunition%29

Hackers Are Threatening Companies To Leak Stolen User Data Online To Hurt Them Through GDPR Regulations – In Return They Are Demanding Ransom Money.]]></description>
		<content:encoded><![CDATA[<p>Ransomhack; a new attack blackmailing business owners using GDPR<br />
<a href="https://www.digitalmunition.me/2018/06/ransomhack-new-attack-blackmailing-business-owners-using-gdpr/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+digitalmunition%2FUHtl+%28DigitalMunition%29" rel="nofollow">https://www.digitalmunition.me/2018/06/ransomhack-new-attack-blackmailing-business-owners-using-gdpr/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+digitalmunition%2FUHtl+%28DigitalMunition%29</a></p>
<p>Hackers Are Threatening Companies To Leak Stolen User Data Online To Hurt Them Through GDPR Regulations – In Return They Are Demanding Ransom Money.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595837</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 11:45:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595837</guid>
		<description><![CDATA[Danny Crichton / TechCrunch:
Automated threat detection service JASK raises $25M Series B led by Kleiner Perkins, bringing total raised to $39M

JASK nets $25M from Kleiner to build out autonomous security operations
https://techcrunch.com/2018/06/28/jask-nets-25m-from-kleiner/

Cyberthreats are on the rise everywhere. Companies are facing a barrage of attacks from hackers near and far, and their security operations centers are struggling to keep up. 

That’s where JASK comes in. The startup offers an autonomous security operations platform to respond to this new security environment, and it’s a mission that is finding resonance among investors.

an in-depth profile of JASK earlier this year, the startup is attempting to completely rebuild the modern security operations center from the ground up. Rather than building manual playbooks, it wants to create a hybrid human-artificial intelligence system that can learn and adapt to new threats while offering more engaging feedback to security analysts. The hope is that the platform will massively reduce the burden of security so that human analysts can spend more of their time on challenging cases rather than routine ones


JASK and the future of autonomous cybersecurity
https://techcrunch.com/2018/03/24/jask-and-the-future-of-autonomous-cybersecurity/

Automated attacks have overwhelmed corporate security departments. This startup is helping to fight back]]></description>
		<content:encoded><![CDATA[<p>Danny Crichton / TechCrunch:<br />
Automated threat detection service JASK raises $25M Series B led by Kleiner Perkins, bringing total raised to $39M</p>
<p>JASK nets $25M from Kleiner to build out autonomous security operations<br />
<a href="https://techcrunch.com/2018/06/28/jask-nets-25m-from-kleiner/" rel="nofollow">https://techcrunch.com/2018/06/28/jask-nets-25m-from-kleiner/</a></p>
<p>Cyberthreats are on the rise everywhere. Companies are facing a barrage of attacks from hackers near and far, and their security operations centers are struggling to keep up. </p>
<p>That’s where JASK comes in. The startup offers an autonomous security operations platform to respond to this new security environment, and it’s a mission that is finding resonance among investors.</p>
<p>an in-depth profile of JASK earlier this year, the startup is attempting to completely rebuild the modern security operations center from the ground up. Rather than building manual playbooks, it wants to create a hybrid human-artificial intelligence system that can learn and adapt to new threats while offering more engaging feedback to security analysts. The hope is that the platform will massively reduce the burden of security so that human analysts can spend more of their time on challenging cases rather than routine ones</p>
<p>JASK and the future of autonomous cybersecurity<br />
<a href="https://techcrunch.com/2018/03/24/jask-and-the-future-of-autonomous-cybersecurity/" rel="nofollow">https://techcrunch.com/2018/03/24/jask-and-the-future-of-autonomous-cybersecurity/</a></p>
<p>Automated attacks have overwhelmed corporate security departments. This startup is helping to fight back</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595836</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 11:44:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595836</guid>
		<description><![CDATA[Catalin Cimpanu / BleepingComputer:
Report: 2,446 Android and 600 iOS apps using Google&#039;s Firebase service found to have misconfigured databases exposing 100M+ records of a wide range of user data

Thousands of Apps Leak Sensitive Data via Misconfigured Firebase Backends
https://www.bleepingcomputer.com/news/security/thousands-of-apps-leak-sensitive-data-via-misconfigured-firebase-backends/

Thousands of iOS and Android mobile applications are exposing over 113 GBs of data via over 2,271 misconfigured Firebase databases, according to a report released this week by mobile security firm Appthority.

Firebase is a Backend-as-a-Service offering from Google that contains a vast collection of services that mobile developers can use in the creation of mobile and web-based apps.

The service is insanely popular with top Android devs, providing cloud messaging, push notifications, database, analytics, advertising, and a bunch more of other backends and APIs that they can easily plug into their projects and benefit from Google&#039;s large-scale and high-performance systems within their apps.
Appthority scanned over 2.7 million mobile apps]]></description>
		<content:encoded><![CDATA[<p>Catalin Cimpanu / BleepingComputer:<br />
Report: 2,446 Android and 600 iOS apps using Google&#8217;s Firebase service found to have misconfigured databases exposing 100M+ records of a wide range of user data</p>
<p>Thousands of Apps Leak Sensitive Data via Misconfigured Firebase Backends<br />
<a href="https://www.bleepingcomputer.com/news/security/thousands-of-apps-leak-sensitive-data-via-misconfigured-firebase-backends/" rel="nofollow">https://www.bleepingcomputer.com/news/security/thousands-of-apps-leak-sensitive-data-via-misconfigured-firebase-backends/</a></p>
<p>Thousands of iOS and Android mobile applications are exposing over 113 GBs of data via over 2,271 misconfigured Firebase databases, according to a report released this week by mobile security firm Appthority.</p>
<p>Firebase is a Backend-as-a-Service offering from Google that contains a vast collection of services that mobile developers can use in the creation of mobile and web-based apps.</p>
<p>The service is insanely popular with top Android devs, providing cloud messaging, push notifications, database, analytics, advertising, and a bunch more of other backends and APIs that they can easily plug into their projects and benefit from Google&#8217;s large-scale and high-performance systems within their apps.<br />
Appthority scanned over 2.7 million mobile apps</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/06/02/cyber-security-june-2018/comment-page-6/#comment-1595816</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 10:53:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177959#comment-1595816</guid>
		<description><![CDATA[The Next Big Cyber-Attack Vector: APIs
https://www.securityweek.com/next-big-cyber-attack-vector-apis

With cyber-attacks on enterprise networks becoming more sophisticated, organizations have stepped up perimeter security by investing in the latest firewall, data and endpoint protection, as well as intrusion prevention technologies. In response, hackers are moving to the path of least resistance and looking for new avenues to exploit. Many security experts believe the next wave of enterprise hacking will be carried out by exploiting Application Programming Interfaces (APIs). 

In fact, cyber adversaries are already targeting APIs when planning their attacks. The data breach at Panera Bread is a good example. The bakery-café chain left an unauthenticated API endpoint exposed on its website, allowing anyone to view customer information such as username, email address, phone number, last four digits of the credit card, birthdate, etc. Ultimately, data belonging to more than 37 million customers was leaked over an eight-month period. This raises the question on how to minimize the growing cyber security risk associated with APIs without hampering the benefits they provide in terms of agile development and expanded functionality.

API usage in application development has become the new de facto standard, whereby developers take advantage of integrating functionality from third-party provided services rather than building all the capabilities they need from scratch. This allows for a more agile development process for new products and services. 

Common attack methods being used to exploit APIs include: 

● API Parameter Tampering - Hackers are often use this technique to either reverse engineer an API or gain further access to sensitive data.

● Session Cookie Tampering - These attacks attempt to exploit cookies in order to bypass security mechanisms or send false data to application servers.

● Man-in-the-Middle Attacks - By eavesdropping on an unencrypted connection between an API client and server, hackers can access sensitive data. 

● Content Manipulation - By injecting malicious content (e.g., poisoning JSON Web tokens), exploits can be distributed and executed in the background. 

● DDoS Attacks - Poorly written code can be used to consume computer resources by sending invalid input parameters, subsequently causing a disruption to the API-supported Web application.

Panerabread.com Leaks Millions of Customer Records
https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/]]></description>
		<content:encoded><![CDATA[<p>The Next Big Cyber-Attack Vector: APIs<br />
<a href="https://www.securityweek.com/next-big-cyber-attack-vector-apis" rel="nofollow">https://www.securityweek.com/next-big-cyber-attack-vector-apis</a></p>
<p>With cyber-attacks on enterprise networks becoming more sophisticated, organizations have stepped up perimeter security by investing in the latest firewall, data and endpoint protection, as well as intrusion prevention technologies. In response, hackers are moving to the path of least resistance and looking for new avenues to exploit. Many security experts believe the next wave of enterprise hacking will be carried out by exploiting Application Programming Interfaces (APIs). </p>
<p>In fact, cyber adversaries are already targeting APIs when planning their attacks. The data breach at Panera Bread is a good example. The bakery-café chain left an unauthenticated API endpoint exposed on its website, allowing anyone to view customer information such as username, email address, phone number, last four digits of the credit card, birthdate, etc. Ultimately, data belonging to more than 37 million customers was leaked over an eight-month period. This raises the question on how to minimize the growing cyber security risk associated with APIs without hampering the benefits they provide in terms of agile development and expanded functionality.</p>
<p>API usage in application development has become the new de facto standard, whereby developers take advantage of integrating functionality from third-party provided services rather than building all the capabilities they need from scratch. This allows for a more agile development process for new products and services. </p>
<p>Common attack methods being used to exploit APIs include: </p>
<p>● API Parameter Tampering &#8211; Hackers are often use this technique to either reverse engineer an API or gain further access to sensitive data.</p>
<p>● Session Cookie Tampering &#8211; These attacks attempt to exploit cookies in order to bypass security mechanisms or send false data to application servers.</p>
<p>● Man-in-the-Middle Attacks &#8211; By eavesdropping on an unencrypted connection between an API client and server, hackers can access sensitive data. </p>
<p>● Content Manipulation &#8211; By injecting malicious content (e.g., poisoning JSON Web tokens), exploits can be distributed and executed in the background. </p>
<p>● DDoS Attacks &#8211; Poorly written code can be used to consume computer resources by sending invalid input parameters, subsequently causing a disruption to the API-supported Web application.</p>
<p>Panerabread.com Leaks Millions of Customer Records<br />
<a href="https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/" rel="nofollow">https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
