Product
Enterprise
Solutions
DocumentationPricing
Resources
Book a DemoSign InGet Started
Product
Solutions
Solutions
Stephen Rees-Carter's profile picture

Stephen Rees-Carter

Read more from Stephen Rees-Carter

SSRF vs CSRF: What is Server-Side Request Forgery? coverAPI Security

SSRF vs CSRF: What is Server-Side Request Forgery?

Server-Side Request Forgery (SSRF) is a dangerous vulnerability that allows attackers to exploit servers by making unauthorized requests to internal or external resources. In this article, we’ll explain how SSRF works, its risks, and how to secure your API against it.

The Hidden Dangers of API Security in Mobile Apps coverAPI Design

The Hidden Dangers of API Security in Mobile Apps

This article explores the security challenges in building SPAs and mobile apps, focusing on vulnerabilities like hardcoded API keys and interception risks in mobile banking apps. It offers insights and strategies to prevent these API security flaws, ensuring robust protection for users and data.

It’s an API, do I really need to escape anything? coverAPI Design

It’s an API, do I really need to escape anything?

Escaping output is often overlooked in APIs, but it’s crucial for preventing security vulnerabilities like XSS attacks. Even when returning JSON, unsafe characters can lead to risks if not properly escaped. This article explores why output escaping is essential and how to secure your API responses.

Who cares about rate and resource limiting? coverAPI Design

Who cares about rate and resource limiting?

Rate limiting is crucial but often overlooked in security. This article explores its importance for all endpoints, not just login forms, using a real-life penetration test story. Learn how comprehensive rate limiting can protect your application from attacks and ensure stability.

Securing your API (the wrong way) coverAPI Design

Securing your API (the wrong way)

Explore API security beyond simple request authentication. Discover why methods like passing usernames and passwords directly to an API expose vulnerabilities. Learn about secure alternatives like Bearer Tokens that offer robust protection and flexibility for modern applications.

How (Not) to Return Data from Your Api coverAPI Design

How (Not) to Return Data from Your Api

APIs serve as vital data conduits between systems. Maximizing data availability empowers users, suggesting a shift towards providing extensive datasets without dwelling on permissions or privacy. This model advocates for APIs as rich data reservoirs, simplifying consumer access and use.

© 2025 Treblle. All Rights Reserved.
GDPR BadgeSOC2 BadgeISO BadgeHIPAA Badge