API Manipulation and Injection Attacks | Build a More Secure API With These Vulnerabilities in Mind

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=u57A-pZLpvY



Duration: 6:29
1,840 views
55


In the third and penultimate video of this series, Mike Elissen, Sr. Developer Advocate at Akamai and expert in cybersecurity, dives deeper into API Manipulation. Learn about common ways hackers will try to exploit your API microservices by manipulating requests and data that can cause all sorts of issues for your business.

Chapters:
0:00 - Introduction
0:24 - Broken Level Function Authorization
2:42 - Injection Attacks
4:29 - Mass Assignment
6:11 - Conclusion

New to Linode? Get started here with a $100 credit → https://www.linode.com/akatube
Check out the Linode API documentation here → https://www.linode.com/docs/api/
Learn more about cybersecurity here → https://www.linode.com/docs/guides/security/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #Akamai #APIs #cybersecurity #APImanipulation
Product: Linode, Akamai, API Security; Mike Elissen;




Other Videos By Akamai Developer


2022-08-31How to Deploy a Static Site using Hugo | Linode Tutorial with TechHut
2022-08-29Part 2 of Building a Portfolio Website from Scratch with Tech With Tim
2022-08-26A Quick Chat with PostgreSQL Association's Stephen Frost at SCaLE 2022
2022-08-25The Best Way to Manage Your APIs | Threats and Solutions
2022-08-24What Exactly is High Availability? Failover and High Availability Demonstration from ZSecurity
2022-08-22Tech With Tim | How to Build a Developer's Portfolio Website From Scratch
2022-08-19Discussing Open Source With The Founder of Nextcloud at SCaLE19x 2022
2022-08-17Create Your Own 24/7 YouTube Live Stream With Ant Media on Linode
2022-08-15Linode High Memory Instances | When You Need More RAM Without Increasing Storage or CPUs
2022-08-12Isolate and Protect Your Infrastructure with a Virtual Private Cloud
2022-08-11API Manipulation and Injection Attacks | Build a More Secure API With These Vulnerabilities in Mind
2022-08-10How to Attach Block storage to Your Plex Server | More Space for More Media
2022-08-08FileRun on Docker | Self Hosted File Sharing and Management Made Fast and Easy
2022-08-05SCaLE Linux Conference Wrap-up with Jay LaCroix and Gardiner Bryant
2022-08-04GitLab explained as fast as possible with PJ Metz
2022-08-03Run Plex in The Cloud | How to Install Plex Media Server on Linode
2022-08-01PwnDrop Fast and Secure Drag and Drop File Hosting | Self Hosted Fast File Sharing
2022-07-31Spicy tech questions and hot takes at SCaLE 19x in Los Angeles California!
2022-07-29Linode is LIVE from SCaLE 19x with Jay LaCroix and Gardiner Bryant
2022-07-29Linode DNS Manager | Total Control Over Your DNS Records
2022-07-28Protecting Your Infrastructure from Attacks | API Availability & API Intel



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
api
api security
akamai
securing an api
api attacks
hacking api
how to secure an api
api security tips
akamai api security
linode api security
api security best practices
penetration testing
api security 101
api security owasp
api security checklist
api management security
api security testing
aimm api security
crapi tools
api testing security
owasp security
owasp api