Welcome to the first episode of The Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec Elephants in the room.| Escape DAST - Application Security Blog
Discover the role of APIs in the financial sector, and how API discovery ensures security, compliance, and efficiency in financial services.| Escape DAST - Application Security Blog
Discover what makes Escape's agentless API discovery technology truly innovative.| Escape DAST - Application Security Blog
tl;dr we scanned 6056+ public APIs on the internet with our in-house feedback driven exploration tech and ranked them using security, performance, reliability, and design criteria. We decided to analyze the resulting data and produce a full featured report: The State of Public APIs 2023 Why build this report?| Escape DAST - Application Security Blog
tl;dr we scanned 6031+ public APIs on the internet with our in-house feedback driven exploration tech and ranked them using security, performance, reliability, and design criteria. The results are public on APIrank.dev. You can also request to index your own API for free and see how it compares| Escape DAST - Application Security Blog
Improve the security of your GraphQL API with Escape and Postman Are you tired of dealing with pesky API vulnerabilities? Want to take your GraphQL game to the next level? Introducing the perfect combo for GraphQL success - Escape and Postman. Escape is a tool that helps developers automatically and| Escape DAST - Application Security Blog
Secure your internal applications with Escape’s Private Locations. Scan behind firewalls or VPNs using Repeater—no exposure, no compromises.| Escape DAST - Application Security Blog
Identify undocumented and potentially vulnerable APIs in your Kubernetes clusters with ease.| Escape DAST - Application Security Blog
Escape expanded into front-end web app and single-page application (SPA) security testing. Help us build a better DAST by joining the closed beta.| Escape DAST - Application Security Blog
We’re thrilled to introduce Escape’s advanced Jira integration! Bridging the gap between security and development has never been easier.| Escape DAST - Application Security Blog
Explore security training's value with Mel Reyes. Is it a crucial investment or just an expense? Tune in to find out.| Escape DAST - Application Security Blog
Secure your organization with our guide on establishing an effective application security policy for ultimate data protection and peace of mind.| Escape DAST - Application Security Blog
Discover GraphQL security experience from the GraphQL pentester point of view. This article will explain discovery in the pentesting process.| Escape DAST - Application Security Blog
Ever had troubles managing your git hooks in a monorepository ? We did too, so we created Mookme to solve our problems. Here is a git hook manager for dealing with different projects and languages, automated filtering, ease of configuration and setup.| Escape DAST - Application Security Blog
Discover our story behind open source GraphQL wordlist for penetration testing, built from 60k+ production GraphQL endpoints. Available on GitHub| Escape DAST - Application Security Blog
Escape launches the first Asset Inventory and Attack Surface Management solution for GraphQL APIs with its new API Catalog feature.| Escape DAST - Application Security Blog
While querying, developing, and testing your GraphQL APIs with postman is easy and convenient, it has a big caveat: if you want to cover an endpoint with all its queries and mutations entirely, it will take you hours and repetitive steps to create every request, and you'll almost surely miss| Escape DAST - Application Security Blog
Introducing Graphinder, a lightweight and blazing fast GraphQL endpoint finder, making penetration testing on GraphQL much faster ⚡️| Escape DAST - Application Security Blog
Explore how the API Security Academy uses WebContainers for interactive Node.js lessons directly in your browser.| Escape DAST - Application Security Blog
Explore why customers prefer Escape over Burp Suite Enterprise, weigh the advantages and disadvantages of both,and determine the best fit for you| Escape DAST - Application Security Blog
Discover the importance of API catalogs, their differences from API portals & gateways, and how to ensure optimal API management and security.| Escape DAST - Application Security Blog
Learn how to test GraphQL with Postman, the go-to tool for querying APIs, and quickly start sending requests and testing your GraphQL endpoints.| Escape DAST - Application Security Blog
Explore how Bright Security differs from Escape, weigh the advantages and disadvantages of both, and determine the best fit for your company.| Escape DAST - Application Security Blog
Introduction Automating the audit of APIs is a very hard problem: we want to dynamically evaluate those APIs' security, performance, and reliability. But APIs take parameters that are tightly coupled to the underlying business logic. We need a way to know what sequences of requests to send, with what parameters,| Escape DAST - Application Security Blog
Discover a Golang-based tool developed at Escape for GraphQL endpoint discovery and fingerprinting, enhancing API security. Available on GitHub.| Escape DAST - Application Security Blog
A new technology partnership enables mutual customers to gain full cloud and application context, establish clear ownership, and accelerate the remediation of critical risks.| Escape DAST - Application Security Blog
Enhance GraphQL security with input validation & sanitization. Learn about homemade middleware,directives and custom scalars for protecting APIs| Escape DAST - Application Security Blog
Web safety matters. XSS is like sneaky bad notes, while CSRF tricks sites as if it's you. Both misuse website trust. We'll explore how they work and how to protect sites, including using CSRF tokens. Learn about online security with us!| Escape DAST - Application Security Blog
Confusion between authentication and authorization causes data leaks. Learn the difference and how to implement the right access control pattern in your GraphQL API.| Escape DAST - Application Security Blog
Discover the benefits of combining SAST and DAST in application security. Watch the webinar recap with experts Tristan Kalos and Amit Bismut.| Escape - The API Security Blog
Discover| Escape DAST - Application Security Blog
And a deep dive into how the state of DAST is changing.| Escape - The API Security Blog
DAST tools (Dynamic Application Security Testing tools) scan running apps and APIs for vulnerabilities like business logic flaws or broken authentication - no source code needed. Unlike legacy tools, modern DAST supports CI/CD and reduces false positives with developer-first workflows.| Escape DAST - Application Security Blog
The main argument for disabling introspection is that it can be a security risk.Learn why disabling introspection in GraphQL may not be necessary| Escape - The API Security Blog
For several days now, your users have been complaining about losing access to your web service. If at first you thought it was a simple coincidence and certainly a fault of the users, the incident starts to be strongly repeated and noticed. You rush to your monitors and notice an| Escape - The API Security Blog
Managing GraphQL errors can be quite a challenging task, and we tried a lot of different approaches over time. Keep reading to know what we've learned along the way.| Escape - The API Security Blog
Discover why Escape is a better API security solution.| Escape - The API Security Blog
We are excited to announce updates to our vulnerability prioritization funnel, which will help you focus on vulnerabilities that pose a real danger to your business.| Escape - The API Security Blog
Explore how you can prevent data breaches in GraphQL. Learn to manage sensitive data effectively with robust access control.| Escape - The API Security Blog
Insecure Direct Object References (IDOR) are common security vulnerabilities. Discover IDOR real-life examples and best practices for GraphQL API| Escape - The API Security Blog
GraphQL aliasing is a powerful feature. But with great power comes great vulnerability: batch attacks and DoS. In this post, we explain how it works and how to remediate it in your GraphQL API.| Escape - The API Security Blog
The relational aspect of GraphQL can be a vulnerability exploited by running deep and cyclic queries causing your API to crawl under the load and crash. That's a Denial of Service. Learn how it works and how you can protect your API!| Escape - The API Security Blog
Cross-Site Scripting (XSS) happens when attackers send malicious scripts via web apps to end users. Learn how to remediate it in GraphQL apps.| Escape - The API Security Blog
We at Escape have been scanning GraphQL APIs for vulnerabilities for more than two years. In this post, we will share the most common GraphQL vulnerabilities, affecting close to all GraphQL APIs we have scanned. We strongly recommend you check your GraphQL APIs for these vulnerabilities.| Escape - The API Security Blog
Discover the challenges Thinkific faced and how they achieved enterprise-grade GraphQL security with Escape.| Escape - The API Security Blog
Discover why Escape is a better API security solution.| Escape - The API Security Blog
Enhance your enterprise's security with expert tips on API gateway security. Learn eight essential practices to protect your API gateways.| Escape - The API Security Blog
Testing your GraphQL API is critical to ensure that your software's business logic is running as expected. Tests will reveal bugs and vulnerabilities before they make it to production. In this tutorial, we go through the practical steps to write unit and integration tests for your GraphQL API.| Escape - The API Security Blog
GraphQL has no security by default. All doors are open for the most basic attacks. Read more to learn about the exact threats and some simple strategies you can implement to get your users' data under lock and key 🔐| Escape - The API Security Blog
We are excited to announce the updates to our DAST scanner, helping you achieve improved performance and obtain better results when testing your APIs.| Escape - The API Security Blog
Are you looking to make your API security program stronger? Our detailed API Security Checklist is here to help.| Escape - The API Security Blog
Today, we’re finally unveiling new capabilities of Escape - agentless discovery and inventory of APIs within their specific business context.| Escape - The API Security Blog
Discover our in-depth guide on application security audits, systematic evaluations conducted to assess the security posture of applications.| Escape - The API Security Blog
Our security team scanned 189.5M URLs and found more than 18,000 exposed API secrets. Discover the methodology that led us to these findings.| Escape - The API Security Blog
Learn how to automatically generate static API specifications from API codebases for Continuous Security Testing (CT)| Escape - The API Security Blog
Explore Broken Object Level Authorization (BOLA), its implications, how it can be exploited, and how to secure your applications against it.| Escape - The API Security Blog
You receive a call in the middle of the night from the SRE team: All production data has been deleted from your company's various relational databases. Many of the company's internal services are therefore down. You absolutely need to fix the problem immediately and identify the problem. Once you log| Escape - The API Security Blog
Discover the latest insights into the 2023 OWASP API Security Top 10, as we delve into the most critical vulnerabilities and best practices to protect your APIs.| Escape - The API Security Blog
We have been doing API Security wrong. Discover how the limitations of traffic-based API security tools might impact your security and why Escape's agentless technology is the best way to protect your APIs.| Escape - The API Security Blog
DevSecOps tutorial: Learn hands-on techniques for securing your apps through vulnerability scanning with Nuclei and ensure robust security| Escape - The API Security Blog
Learn to detect/avoid vulnerable dependencies in app development with Software Composition Analysis (SCA) using a voluntary vulnerable Python app| Escape - The API Security Blog
Understand main Shadow API risks, and discover powerful strategies to curb Shadow API sprawl effectively.| Escape - The API Security Blog
Learn more about the concept of API sprawl, its implications, and the challenges and importance of API governance.| Escape - The API Security Blog
With our new Compliance Matrix feature, it takes just a few simple steps to get full visibility into your organization's compliance posture across all applications.| Escape - The API Security Blog
Uncover API discovery's vital role in cybersecurity. Learn about automated vs. manual API discovery and how API Inventory tools can help.| Escape - The API Security Blog
Discover how Shine, an online banking for professionals, enhanced API security. Explore their challenges and the transformative impact of Escape| Escape - The API Security Blog
Discover how Lightspeed, the unified point of sale and payments platform, maintains security compliance, and explore its API security challenges.| Escape - The API Security Blog
Since 2022, Escape's security research team has been tracking API-related data breaches. We’ve decided to make our database public, providing detailed insights into primary attack vectors, threat actors, tools, and techniques. The database is updated every two weeks.| Escape - The API Security Blog
We are excited to introduce our latest feature: automated schema generation for all your discovered APIs.| Escape - The API Security Blog
Explore the limitations of current automated specification generation tools and how Escape's static analysis techniques stand out.| Escape - The API Security Blog
A recap of Twilio's Authy app breach, which exposed 33 million phone numbers. Including the impacts, lessons learnt and recommendations to enhance your security.| Escape - The API Security Blog
Discover how Escape secures the development of the online services of the French Football Federation.| Escape - The API Security Blog
Découvrez comment Escape sécurise le développement des services en ligne de la Fédération Française de Football.| Escape - The API Security Blog
Learn about the shift-left approach in cybersecurity and how it integrates security practices into the early stages of software development.| Escape - The API Security Blog
Explore different penetration testing types, including black-box, white-box, and grey-box testing, and discover their unique attack vectors.| Escape - The API Security Blog
This blog is based on our conversation with Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric. It covers the unique challenges of software supply chain security.| Escape - The API Security Blog
This blog is based on the podcast episode with Max Imbiel, CISO at Bitpanda. It covers the unique challenges of building secure financial applications.| Escape DAST - Application Security Blog
In this article we benchmark Escape against other DAST tools. Focusing on VAmPI and DVGA, we compare results across different API types.| Escape DAST - Application Security Blog
Dive into the complexities of securing GraphQL APIs and common vulnerabilities and learn best practices for enhancing GraphQL security.| Escape DAST - Application Security Blog
DAST is dead, discover why business logic security testing takes center stage.| Escape DAST - Application Security Blog
In this article, we'll show how we created Escape's proprietary business logic security testing algorithm and what makes it innovative.| Escape DAST - Application Security Blog
With our updates to API discovery and inventory, you gain even more capabilities to easily achieve complete governance.| Escape - The API Security Blog
Learn why security engineers need a new approach to identify business logic flaws.| Escape DAST - Application Security Blog
Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake.| Escape DAST - Application Security Blog
Discover how Escape rules are the new generation of custom security tests for your API security.| Escape DAST - Application Security Blog
Discover the value of developer security training for developers and effective strategies for fostering a secure software development culture.| Escape DAST - Application Security Blog
Explore the latest insights on sensitive data exposure in 2024 and learn effective prevention strategy for protecting your company's information| Escape DAST - Application Security Blog
Discover the impact of API sprawl in 2024 and learn how to effectively navigate it with expert insights from our team.| Escape DAST - Application Security Blog
Today, we're joined by Anmol Agarwal, a security researcher at Nokia. Tune in as we challenge her insights on adversarial machine learning.| Escape DAST - Application Security Blog
Prepare for PCI DSS 4.0 compliance with our in-depth guide and protect your payment transactions with robust API security measures.| Escape DAST - Application Security Blog
This article was written by the guest expert, Aleksandr Krasnov. Aleksandr is the DevSecOps expert, principal security engineer, and an advisor. He has worked in companies like Meta, Dropbox, and Palo Alto Networks.| Escape - The API Security Blog
Dive into our latest blog post, and uncover invaluable insights collected from the recent application security incidents.| Escape - The API Security Blog
Learn to secure your Flask applications effectively with our expert hands-on tutorial. Enhance security for your projects in just a few steps!| Escape - The API Security Blog
Explore whether APIs introduce more security risks than benefits to SCADA systems, how hard it is to secure SCADA, and key future challenges.| Escape - The API Security Blog
Explore 2025's top API security tools: Get in-depth reviews, pros, cons, and choose the best security tool for your API security needs.| Escape - The API Security Blog
Threat modeling is the future of cybersecurity or just another buzzword? Discover the answer to this question and more in our latest podcast.| Escape - The API Security Blog
Explore the definition of business logic, its flaws, the differences with application logic, and how to prevent business logic attacks.| Escape - The API Security Blog
Welcome to the second episode of The Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec Elephants in the room.| Escape - The API Security Blog
In-depth recap of our hands-on product security webinar with James Berthoty—gather the best knowledge and insights!| Escape - The API Security Blog
Explore our guide on the vulnerability management lifecycle. Understand 6 key stages & best practices for improving your cybersecurity framework.| Escape - The API Security Blog