Maham

Maham

Maham is a web developer who seems to love technical writing. As a published author, my work and writings have been featured in the NoteWorthy Journal at Medium.

How do API Endpoints work?

An API allows communication between two systems efficiently and this interaction with other systems requires endpoints.

An Introduction to SOAP API

There are different architectures available for communication between client and server. SOAP APIs are one of them.

APIs Security Challenges

API vulnerabilities are common and can break down your whole system if not treated, and more API breaches occur due to these vulnerabilities.

​​API Security - Broken Object Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Injection Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, injection, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Broken Function Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.