Second wave of Shai-Hulud npm worm compromises the global software supply chain
How to build a real-time API inventory
API scanning: How it works and when to use it
API scanning and security testing: The core of modern application security
Red Hat Consulting GitLab breach raises concerns over customer data exposure
API pen testing vs. continuous scanning: Key differences & benefits
Stateful API scanning: Why context matters for API security
Automated API vulnerability scanning: Security and compliance benefits
API vulnerability scanning: Tests to run first