20 Guides

API Security

All posts are related to the "API Security" category.

How RapidAPI helps developers authenticate APIs?

There are multiple API authentication methods available. In this piece, let’s look at which API authentication methods are supported by RapidAPI.

APIs Security Challenges

API vulnerabilities are common and can break down your whole system if not treated, and more API breaches occur due to these vulnerabilities.

​​API Security - Broken Object Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Injection Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, injection, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Broken Function Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Insufficient Logging & Monitoring Vulnerability

APIs may have vulnerabilities like broken authentication, insufficient logging & monitoring, lack of rate limiting, etc. Let's take a look at one of them.

API Security With Rapid

Rapid provides high level security by enforcing policies in runtime and protecting against runtime attacks.

API Security: Excessive Data Exposure Vulnerability

In Excessive Data Exposure Vulnerability, the API sends more data than required to the client. In this piece, let's look at it and some prevention measures.

​​API Security - Lack of Resources & Rate Limiting Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Misconfiguration Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, misconfiguration, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Improper Assets Management Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, improper assets management, lack of rate limiting, etc. Let's take a look at one of them..

API Security - Broken User Authentication Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

A brief guide on API Mass Assignment Vulnerability

It is a severe API threat that arises when you save the request body as it is on the server instead of getting values from it one by one. In this piece, let's take a quick look at it.

Five Basic Practices For REST API Security

REST APIs allow you to create, read, update and delete operations between a client and a server. There are a number of ways to secure REST APIs.

What are API Injections and how to prevent them?

When the user sends malicious code (most of the time database query) with the API request, they execute an API injection. In this piece, let's take a look at it and how you can prevent it from happening.

Best Practices for REST API Security

With the rise of APIs, API security demands more focus than ever. Let's discuss some practices that can help secure REST APIs.

Best Practices for GraphQL API Security

GraphQL APIs are a tad different from conventional REST APIs, so let's discuss some practices specifically for GraphQL APIs.

Five More APIs That Add Security Capabilities To Your Application

API is a channel that applications utilize to talk with each other. You put some information at one end, the API takes that information and gets back with a result. This guide will focus on those APIs that provide security-related features.

Best Practices of API Authentication

With the rise of APIs, API security demands more focus than ever. Authentication determines the client's identity who is sending the request and ensures that your API is properly secured. This guide will highlight some good practices of API Authentication.

Five APIs That Add Security Capabilities To Your Application

API is a channel that applications utilize to talk with each other. You put some information at one end, the API takes that information and gets back with a result. In this guide, we will focus on those APIs that provide security related features. authors: