DiscoverThe Cosive Podcast - Cyber Threat Intelligence and Security OperationsSecuring REST API Endpoints (or How to Avoid Another Optus) with James Cooper
Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper

Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper

Update: 2022-10-27
Share

Description

Unless you have been living in a cave on Mars with your eyes shut and your fingers in your ears for the past few weeks, you have probably heard something about a data breach at Australian telecommunications giant Optus.

As security mistakes go, the vulnerability reported to have enabled the attack leans toward the more embarrassing side of the scale. If reports are true, Optus has effectively exposed customer data on an endpoint available to the entire internet.

While it is plausible that a developer will forget to (re)secure an endpoint once they finish their development work, there are multiple practical steps you can take to catch or mitigate the problem.
Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper

Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper

Cosive