API Manipulation and Injection Attacks | Build a More Secure API With These Vulnerabilities in Mind
In the third and penultimate video of this series, Mike Elissen, Sr. Developer Advocate at Akamai and expert in cybersecurity, dives deeper into API Manipulation. Learn about common ways hackers will try to exploit your API microservices by manipulating requests and data that can cause all sorts of issues for your business.
Chapters:
0:00 - Introduction
0:24 - Broken Level Function Authorization
2:42 - Injection Attacks
4:29 - Mass Assignment
6:11 - Conclusion
New to Linode? Get started here with a $100 credit → https://www.linode.com/akatube
Check out the Linode API documentation here → https://www.linode.com/docs/api/
Learn more about cybersecurity here → https://www.linode.com/docs/guides/security/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1
#Linode #Akamai #APIs #cybersecurity #APImanipulation
Product: Linode, Akamai, API Security; Mike Elissen;