<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — API Security</title>
  <link>https://appsec.fyi/apisec.html</link>
  <description>Curated API Security resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/apisec.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Wed, 22 Apr 2026 18:38:42 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>A Deep Dive on the Most Critical API Vulnerability: BOLA</title>
    <link>https://inonst.medium.com/a-deep-dive-on-the-most-critical-api-vulnerability-bola-1342224ec3f2</link>
    <guid isPermaLink="true">https://inonst.medium.com/a-deep-dive-on-the-most-critical-api-vulnerability-bola-1342224ec3f2</guid>
    <description>A Deep Dive on the Most Critical API Vulnerability: BOLA</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:36 +0000</pubDate>
  </item>
  <item>
    <title>What Is Broken Object Property Level Authorization?</title>
    <link>https://www.paloaltonetworks.com/cyberpedia/broken-object-property-level-authorization</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/cyberpedia/broken-object-property-level-authorization</guid>
    <description>What Is Broken Object Property Level Authorization?</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:35 +0000</pubDate>
  </item>
  <item>
    <title>What Is Broken Object Level Authorization?</title>
    <link>https://www.paloaltonetworks.com/cyberpedia/broken-object-level-authentication-api1</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/cyberpedia/broken-object-level-authentication-api1</guid>
    <description>What Is Broken Object Level Authorization?</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:35 +0000</pubDate>
  </item>
  <item>
    <title>This Is How I Hacked an API Using Mass Assignment Vulnerability</title>
    <link>https://spyboy.blog/2026/01/14/this-is-how-i-hacked-an-api-using-mass-assignment-vulnerability/</link>
    <guid isPermaLink="true">https://spyboy.blog/2026/01/14/this-is-how-i-hacked-an-api-using-mass-assignment-vulnerability/</guid>
    <description>This Is How I Hacked an API Using Mass Assignment Vulnerability</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:34 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34839: CORS Vulnerability in Glances REST API</title>
    <link>https://www.getastra.com/blog/vulnerability/cve-2026-34839/</link>
    <guid isPermaLink="true">https://www.getastra.com/blog/vulnerability/cve-2026-34839/</guid>
    <description>CVE-2026-34839: CORS Vulnerability in Glances REST API</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:33 +0000</pubDate>
  </item>
  <item>
    <title>API ThreatStats Report 2026</title>
    <link>https://www.wallarm.com/reports/2026-wallarm-api-threatstats-report</link>
    <guid isPermaLink="true">https://www.wallarm.com/reports/2026-wallarm-api-threatstats-report</guid>
    <description>API ThreatStats Report 2026</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:32 +0000</pubDate>
  </item>
  <item>
    <title>VAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities</title>
    <link>https://github.com/erev0s/VAmPI</link>
    <guid isPermaLink="true">https://github.com/erev0s/VAmPI</guid>
    <description>VAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:32 +0000</pubDate>
  </item>
  <item>
    <title>API4:2023 Unrestricted Resource Consumption</title>
    <link>https://salt.security/blog/api4-2023-unrestricted-resource-consumption</link>
    <guid isPermaLink="true">https://salt.security/blog/api4-2023-unrestricted-resource-consumption</guid>
    <description>API4:2023 Unrestricted Resource Consumption</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:31 +0000</pubDate>
  </item>
  <item>
    <title>1H 2026 State of AI and API Security Report (Salt)</title>
    <link>https://salt.security/blog/the-era-of-agentic-security-is-here-key-findings-from-the-1h-2026-state-of-ai-and-api-security-report</link>
    <guid isPermaLink="true">https://salt.security/blog/the-era-of-agentic-security-is-here-key-findings-from-the-1h-2026-state-of-ai-and-api-security-report</guid>
    <description>1H 2026 State of AI and API Security Report (Salt)</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:30 +0000</pubDate>
  </item>
  <item>
    <title>PortSwigger Lab: Exploiting a Mass Assignment Vulnerability</title>
    <link>https://portswigger.net/web-security/api-testing/lab-exploiting-mass-assignment-vulnerability</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/api-testing/lab-exploiting-mass-assignment-vulnerability</guid>
    <description>PortSwigger Lab: Exploiting a Mass Assignment Vulnerability</description>
    <category>API Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:30 +0000</pubDate>
  </item>
  <item>
    <title>BOLA API Attack &amp; Prevention — StackHawk</title>
    <link>https://www.stackhawk.com/blog/understanding-and-protecting-against-api1-broken-object-level-authorization/</link>
    <guid isPermaLink="true">https://www.stackhawk.com/blog/understanding-and-protecting-against-api1-broken-object-level-authorization/</guid>
    <description>BOLA API Attack &amp; Prevention — StackHawk</description>
    <category>API Security</category>
    <pubDate>Sun, 19 Apr 2026 02:37:05 +0000</pubDate>
  </item>
  <item>
    <title>Broken Object-Level Authorization (BOLA): What It Is and How to Prevent It</title>
    <link>https://www.invicti.com/blog/web-security/broken-object-level-authorization-bola</link>
    <guid isPermaLink="true">https://www.invicti.com/blog/web-security/broken-object-level-authorization-bola</guid>
    <description>Broken Object-Level Authorization (BOLA): What It Is and How to Prevent It</description>
    <category>API Security</category>
    <pubDate>Sun, 19 Apr 2026 02:37:05 +0000</pubDate>
  </item>
  <item>
    <title>OWASP Top 10 API Security Risks and How to Mitigate Them — Pynt</title>
    <link>https://www.pynt.io/learning-hub/owasp-top-10-guide/owasp-top-10-api-security-risks-and-how-to-mitigate-them</link>
    <guid isPermaLink="true">https://www.pynt.io/learning-hub/owasp-top-10-guide/owasp-top-10-api-security-risks-and-how-to-mitigate-them</guid>
    <description>OWASP Top 10 API Security Risks and How to Mitigate Them — Pynt</description>
    <category>API Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:17 +0000</pubDate>
  </item>
  <item>
    <title>OWASP Top 10 2025: Latest Changes and Enhancements</title>
    <link>https://www.indusface.com/learning/owasp-top-10-vulnerabilities/</link>
    <guid isPermaLink="true">https://www.indusface.com/learning/owasp-top-10-vulnerabilities/</guid>
    <description>OWASP Top 10 2025: Latest Changes and Enhancements</description>
    <category>API Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:16 +0000</pubDate>
  </item>
  <item>
    <title>OWASP API Security Top 10 Vulnerabilities — 2025</title>
    <link>https://www.clouddefense.ai/api-security-top-10-vulnerabilities/</link>
    <guid isPermaLink="true">https://www.clouddefense.ai/api-security-top-10-vulnerabilities/</guid>
    <description>OWASP API Security Top 10 Vulnerabilities — 2025</description>
    <category>API Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:15 +0000</pubDate>
  </item>
  <item>
    <title>MCP Access Control: OPA vs Cedar - Natoma</title>
    <link>https://natoma.ai/blog/mcp-access-control-opa-vs-cedar-the-definitive-guide</link>
    <guid isPermaLink="true">https://natoma.ai/blog/mcp-access-control-opa-vs-cedar-the-definitive-guide</guid>
    <description>MCP Access Control: OPA vs Cedar - Natoma</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:59 +0000</pubDate>
  </item>
  <item>
    <title>Stateful REST API Fuzzing with RESTler</title>
    <link>https://www.code-intelligence.com/blog/stateful-rest-api-fuzzing</link>
    <guid isPermaLink="true">https://www.code-intelligence.com/blog/stateful-rest-api-fuzzing</guid>
    <description>Stateful REST API Fuzzing with RESTler</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:58 +0000</pubDate>
  </item>
  <item>
    <title>Inside Modern API Attacks: 2026 API ThreatStats Report - Wallarm</title>
    <link>https://lab.wallarm.com/inside-modern-api-attacks-what-we-learn-from-the-2026-api-threatstats-report/</link>
    <guid isPermaLink="true">https://lab.wallarm.com/inside-modern-api-attacks-what-we-learn-from-the-2026-api-threatstats-report/</guid>
    <description>Inside Modern API Attacks: 2026 API ThreatStats Report - Wallarm</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:57 +0000</pubDate>
  </item>
  <item>
    <title>OWASP API Security Testing Framework</title>
    <link>https://owasp.org/www-project-api-security-testing-framework/</link>
    <guid isPermaLink="true">https://owasp.org/www-project-api-security-testing-framework/</guid>
    <description>OWASP API Security Testing Framework</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:57 +0000</pubDate>
  </item>
  <item>
    <title>Kong API Gateway Misconfigurations Case Study - Trend Micro</title>
    <link>https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/kong-api-gateway-misconfigurations-an-api-gateway-security-case-study</link>
    <guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/kong-api-gateway-misconfigurations-an-api-gateway-security-case-study</guid>
    <description>Kong API Gateway Misconfigurations Case Study - Trend Micro</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:56 +0000</pubDate>
  </item>
  <item>
    <title>API Security Testing: Tools and Techniques - API7.ai</title>
    <link>https://api7.ai/learning-center/api-101/api-security-testing-tools-and-techiniques</link>
    <guid isPermaLink="true">https://api7.ai/learning-center/api-101/api-security-testing-tools-and-techiniques</guid>
    <description>API Security Testing: Tools and Techniques - API7.ai</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:55 +0000</pubDate>
  </item>
  <item>
    <title>BOLA and BFLA: The API Vulnerabilities That Silently Expose Data</title>
    <link>https://lorikeetsecurity.com/blog/api-security-bola-bfla</link>
    <guid isPermaLink="true">https://lorikeetsecurity.com/blog/api-security-bola-bfla</guid>
    <description>BOLA and BFLA: The API Vulnerabilities That Silently Expose Data</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:55 +0000</pubDate>
  </item>
  <item>
    <title>API Penetration Testing: Complete Guide</title>
    <link>https://nflo.tech/knowledge-base/api-penetration-testing-complete-guide/</link>
    <guid isPermaLink="true">https://nflo.tech/knowledge-base/api-penetration-testing-complete-guide/</guid>
    <description>API Penetration Testing: Complete Guide</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:54 +0000</pubDate>
  </item>
  <item>
    <title>How to Protect APIs from OWASP Authorization Risks: BOLA, BOPLA and BFLA - 42Crunch</title>
    <link>https://42crunch.com/how-to-protect-apis-from-owasp-authorization-risks-bola-bopla-bfla/</link>
    <guid isPermaLink="true">https://42crunch.com/how-to-protect-apis-from-owasp-authorization-risks-bola-bopla-bfla/</guid>
    <description>How to Protect APIs from OWASP Authorization Risks: BOLA, BOPLA and BFLA - 42Crunch</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:53 +0000</pubDate>
  </item>
  <item>
    <title>Securing the Gates: Mastering BOLA and BFLA in API Security</title>
    <link>https://www.kayssel.com/post/bola-and-bfla/</link>
    <guid isPermaLink="true">https://www.kayssel.com/post/bola-and-bfla/</guid>
    <description>Securing the Gates: Mastering BOLA and BFLA in API Security</description>
    <category>API Security</category>
    <pubDate>Thu, 16 Apr 2026 21:02:52 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting API4: 8 Real-World Unrestricted Resource Consumption Attack Scenarios</title>
    <link>https://securityboulevard.com/2025/08/exploiting-api4-8-real-world-unrestricted-resource-consumption-attack-scenarios-and-how-to-stop-them/</link>
    <guid isPermaLink="true">https://securityboulevard.com/2025/08/exploiting-api4-8-real-world-unrestricted-resource-consumption-attack-scenarios-and-how-to-stop-them/</guid>
    <description>Exploiting API4: 8 Real-World Unrestricted Resource Consumption Attack Scenarios</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:53 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting Server-Side Request Forgery in an API</title>
    <link>https://danaepp.com/exploiting-ssrf-in-an-api</link>
    <guid isPermaLink="true">https://danaepp.com/exploiting-ssrf-in-an-api</guid>
    <description>Exploiting Server-Side Request Forgery in an API</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:52 +0000</pubDate>
  </item>
  <item>
    <title>API Versioning Vulnerabilities: Deprecated Endpoints Still Accepting Requests</title>
    <link>https://medium.com/@instatunnel/api-versioning-vulnerabilities-the-deprecated-endpoints-still-accepting-requests-3b53631dfad6</link>
    <guid isPermaLink="true">https://medium.com/@instatunnel/api-versioning-vulnerabilities-the-deprecated-endpoints-still-accepting-requests-3b53631dfad6</guid>
    <description>API Versioning Vulnerabilities: Deprecated Endpoints Still Accepting Requests</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:52 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting JWT Vulnerabilities: Advanced Exploitation Guide</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-jwt-vulnerabilities</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-jwt-vulnerabilities</guid>
    <description>Exploiting JWT Vulnerabilities: Advanced Exploitation Guide</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:51 +0000</pubDate>
  </item>
  <item>
    <title>openapi-fuzzer: Black-box Fuzzer for OpenAPI Specifications</title>
    <link>https://github.com/matusf/openapi-fuzzer</link>
    <guid isPermaLink="true">https://github.com/matusf/openapi-fuzzer</guid>
    <description>openapi-fuzzer: Black-box Fuzzer for OpenAPI Specifications</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:50 +0000</pubDate>
  </item>
  <item>
    <title>CATS: REST API Fuzzer and Negative Testing Tool</title>
    <link>https://endava.github.io/cats/</link>
    <guid isPermaLink="true">https://endava.github.io/cats/</guid>
    <description>CATS: REST API Fuzzer and Negative Testing Tool</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:50 +0000</pubDate>
  </item>
  <item>
    <title>RESTler: Stateful REST API Fuzzing Tool</title>
    <link>https://github.com/microsoft/restler-fuzzer</link>
    <guid isPermaLink="true">https://github.com/microsoft/restler-fuzzer</guid>
    <description>RESTler: Stateful REST API Fuzzing Tool</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:49 +0000</pubDate>
  </item>
  <item>
    <title>BFLA: Broken Function Level Authorization</title>
    <link>https://tcm-sec.com/bfla-broken-function-level-authorization/</link>
    <guid isPermaLink="true">https://tcm-sec.com/bfla-broken-function-level-authorization/</guid>
    <description>BFLA: Broken Function Level Authorization</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:48 +0000</pubDate>
  </item>
  <item>
    <title>API Gateway Authorizers: Vulnerable By Design</title>
    <link>https://authress.io/knowledge-base/articles/2025/05/25/api-gateway-authorizers-vulnerable-by-design</link>
    <guid isPermaLink="true">https://authress.io/knowledge-base/articles/2025/05/25/api-gateway-authorizers-vulnerable-by-design</guid>
    <description>API Gateway Authorizers: Vulnerable By Design</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:47 +0000</pubDate>
  </item>
  <item>
    <title>HTTP Request Smuggling in API Gateways</title>
    <link>https://www.apisec.ai/blog/http-request-smuggling-in-api-gateway</link>
    <guid isPermaLink="true">https://www.apisec.ai/blog/http-request-smuggling-in-api-gateway</guid>
    <description>HTTP Request Smuggling in API Gateways</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:47 +0000</pubDate>
  </item>
  <item>
    <title>Kong API Gateway Misconfigurations: A Security Case Study</title>
    <link>https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/kong-api-gateway-misconfigurations-an-api-gateway-security-case-study</link>
    <guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/kong-api-gateway-misconfigurations-an-api-gateway-security-case-study</guid>
    <description>Kong API Gateway Misconfigurations: A Security Case Study</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:46 +0000</pubDate>
  </item>
  <item>
    <title>Swagger-EZ: Pentesting APIs Using OpenAPI Definitions</title>
    <link>https://github.com/RhinoSecurityLabs/Swagger-EZ</link>
    <guid isPermaLink="true">https://github.com/RhinoSecurityLabs/Swagger-EZ</guid>
    <description>Swagger-EZ: Pentesting APIs Using OpenAPI Definitions</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:45 +0000</pubDate>
  </item>
  <item>
    <title>APIDetector: Scan for Exposed Swagger Endpoints</title>
    <link>https://github.com/brinhosa/apidetector</link>
    <guid isPermaLink="true">https://github.com/brinhosa/apidetector</guid>
    <description>APIDetector: Scan for Exposed Swagger Endpoints</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:45 +0000</pubDate>
  </item>
  <item>
    <title>Autoswagger: Automated Discovery and Testing of OpenAPI and Swagger Endpoints</title>
    <link>https://www.darknet.org.uk/2025/10/autoswagger-automated-discovery-and-testing-of-openapi-swagger-endpoints/</link>
    <guid isPermaLink="true">https://www.darknet.org.uk/2025/10/autoswagger-automated-discovery-and-testing-of-openapi-swagger-endpoints/</guid>
    <description>Autoswagger: Automated Discovery and Testing of OpenAPI and Swagger Endpoints</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:44 +0000</pubDate>
  </item>
  <item>
    <title>Swagger Jacker: Auditing OpenAPI Definition Files</title>
    <link>https://bishopfox.com/blog/swagger-jacker-auditing-openapi-definition-files</link>
    <guid isPermaLink="true">https://bishopfox.com/blog/swagger-jacker-auditing-openapi-definition-files</guid>
    <description>Swagger Jacker: Auditing OpenAPI Definition Files</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:43 +0000</pubDate>
  </item>
  <item>
    <title>PayloadsAllTheThings: API Key Leaks</title>
    <link>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/API%20Key%20Leaks/README.md</link>
    <guid isPermaLink="true">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/API%20Key%20Leaks/README.md</guid>
    <description>PayloadsAllTheThings: API Key Leaks</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:42 +0000</pubDate>
  </item>
  <item>
    <title>State of Secrets: 28 Million Credentials Leaked on GitHub in 2025</title>
    <link>https://snyk.io/articles/state-of-secrets/</link>
    <guid isPermaLink="true">https://snyk.io/articles/state-of-secrets/</guid>
    <description>State of Secrets: 28 Million Credentials Leaked on GitHub in 2025</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:41 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing Rate Limits: All Known Techniques</title>
    <link>https://medium.com/@shahwarshah/bypassing-rate-limits-all-known-techniques-fffda37a7fa7</link>
    <guid isPermaLink="true">https://medium.com/@shahwarshah/bypassing-rate-limits-all-known-techniques-fffda37a7fa7</guid>
    <description>Bypassing Rate Limits: All Known Techniques</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:40 +0000</pubDate>
  </item>
  <item>
    <title>Rate Limit Bypass - HackTricks</title>
    <link>https://book.hacktricks.xyz/pentesting-web/rate-limit-bypass</link>
    <guid isPermaLink="true">https://book.hacktricks.xyz/pentesting-web/rate-limit-bypass</guid>
    <description>Rate Limit Bypass - HackTricks</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:39 +0000</pubDate>
  </item>
  <item>
    <title>Hacking APIs: Bypassing Rate Limiting</title>
    <link>https://iaraoz.medium.com/hacking-apis-bypassing-rate-limiting-0c7bd075b86c</link>
    <guid isPermaLink="true">https://iaraoz.medium.com/hacking-apis-bypassing-rate-limiting-0c7bd075b86c</guid>
    <description>Hacking APIs: Bypassing Rate Limiting</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:39 +0000</pubDate>
  </item>
  <item>
    <title>What is Mass Assignment? Attacks and Security Tips</title>
    <link>https://www.vaadata.com/blog/what-is-mass-assignment-attacks-and-security-tips/</link>
    <guid isPermaLink="true">https://www.vaadata.com/blog/what-is-mass-assignment-attacks-and-security-tips/</guid>
    <description>What is Mass Assignment? Attacks and Security Tips</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:38 +0000</pubDate>
  </item>
  <item>
    <title>API Security 101: Mass Assignment and Exploitation in the Wild</title>
    <link>https://www.cobalt.io/blog/mass-assignment-apis-exploitation-in-the-wild</link>
    <guid isPermaLink="true">https://www.cobalt.io/blog/mass-assignment-apis-exploitation-in-the-wild</guid>
    <description>API Security 101: Mass Assignment and Exploitation in the Wild</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:37 +0000</pubDate>
  </item>
  <item>
    <title>What is BOLA? 3-digit bounty from Topcoder</title>
    <link>https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64</link>
    <guid isPermaLink="true">https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64</guid>
    <description>What is BOLA? 3-digit bounty from Topcoder</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:34 +0000</pubDate>
  </item>
  <item>
    <title>API1:2023 Broken Object Level Authorization</title>
    <link>https://lab.wallarm.com/api12023-broken-object-level-authorization/</link>
    <guid isPermaLink="true">https://lab.wallarm.com/api12023-broken-object-level-authorization/</guid>
    <description>API1:2023 Broken Object Level Authorization</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:33 +0000</pubDate>
  </item>
  <item>
    <title>Exposing a New BOLA Vulnerability in Grafana</title>
    <link>https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/</link>
    <guid isPermaLink="true">https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/</guid>
    <description>Exposing a New BOLA Vulnerability in Grafana</description>
    <category>API Security</category>
    <pubDate>Sat, 11 Apr 2026 16:42:32 +0000</pubDate>
  </item>
</channel>
</rss>