Discover ways to modify API requests during testing to corrupt data and manipulate code flow, allowing you to uncover new vulnerabilities.| Dana Epp's Blog
Learn how to use Param Miner to find hidden parameters that may help manipulate an API in unintended ways, revealing potential security flaws| Dana Epp's Blog
Restricting emergency alerts during a disaster due to rate limiting is in itself a disaster. Learn how to look for this during API testing.| Dana Epp's Blog
The Ten Most Critical API Security Risks| owasp.org