У нас вы можете посмотреть бесплатно 2025 API Breaches: Zombie APIs, Broken Auth, and Other Nightmares Lurking in Your Stack или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Zombie APIs. Broken authentication. Massive data exfiltration. This end-of-year APIsecU session dives deep into the most important API breaches of 2025, exposing how attackers abused internal APIs, third-party integrations, weak authorization, and missing rate limits—and what security teams could have done differently. If you’re responsible for API security, AppSec, DevSecOps, Red Teaming, or security leadership, this session breaks down real incidents, real attack paths, and real defensive lessons. About this video In this session, the APIsecU team analyzes multiple high-profile incidents through an API security lens, including third-party support platforms, internal APIs becoming externally reachable, API enumeration, smishing-driven access, and excessive data exposure. You’ll also see demos of tools for API discovery, OpenAPI generation, and MCP (Model Context Protocol) discovery/audit—plus details on free CASA (Certified API Security Analyst) vouchers and the API Security Person of the Year awards. ⸻ What’s Inside This Session Recent API Breaches, Dissected (what happened + what failed at the API layer) We don’t just read headlines—we break down root causes, attacker tradecraft, and missing controls (rate limiting, anomaly detection, authorization checks, and internal API hardening). Covered incidents: • Discord & Zendesk: third-party access, internal APIs, large-scale data exfiltration • OpenAI & Mixpanel: smishing (SMS phishing), analytics exposure, supply- chain risk • WhatsApp: API enumeration at planetary scale (3.5B records) • Intel: internal API auth bypass + excessive data exposure (including a ~1GB JSON response) ⸻ Live Demos: New APIsec Tools BOLT (browser-based API discovery for pentesters & red teamers) • Auto-detect API calls from real traffic • Generate OpenAPI (OAS) specs automatically • Reduce noise + accelerate recon and testing MCP Discovery & Audit (MCP compliance visibility + risk analysis) • Discover unauthorized MCP usage in repos • Flag risky capabilities (shell execution, file system access, etc.) • Privacy-first: local analysis / no repo contents sent back ⸻ Free CASA Vouchers (Certified API Security Analyst) We’re giving away CASA vouchers to anyone who tries the MCP Discovery & Audit tool and shares feedback. No raffle. No gatekeeping. ⸻ API Security Person of the Year • Community-voted winner (3,300+ votes!) • Board-selected winner A reminder of how much education, community, and mentorship move the security industry forward. ⸻ What This Session Is Really About (core takeaways) • Why internal APIs are not “internal” • Why legacy identifiers (phone numbers, IDs) keep breaking modern systems • Why automation helps attackers and defenders • Why API security now intersects with AI, LLMs, and MCP ⸻ Who this is for • CISOs / Security leaders assessing real API risk • AppSec / DevSecOps defending modern API ecosystems • Red Team / Pentesters hunting auth + logic flaws • API security engineers building resilient controls at scale If that’s you — t this session is for you. ⸻ Links & Resources 📌 Try the MCP Discovery & Audit tool: https://apisec-inc.github.io/mcp-audit/ 📌 Book a private MCP Security Workshop for your team: https://www.apisecuniversity.com/api-... 📌 Explore free APIsecU courses: https://www.apisecuniversity.com/#cou... 📌 Test your own APIs for free at APIsec.ai: https://www.apisec.ai/sign-up 👍 Like, Subscribe, and Share for more real-world API security—no fluff, no vendor nonsense.