LambdaTest announced its partnership with Assembla, a cloud-based platform for version control and project management.
Every mobile app is built around a set of APIs. In fact, it's not much of an exaggeration to describe APIs as the heart of day's modern mobile. Because of their centrality to the function of mobile apps, securing each API is a difficult task. The burden is placed squarely on mobile app developers, most of whom are not security experts.
In September, OWASP(link is external) published the OWASP API Security Top 10(link is external) Release Candidate, a list of the top ten security weaknesses in application programming interfaces (APIs). Eight of these issues directly relate to mobile app development processes:
■ Broken Object Level Authorization can create a wide attack surface level access control issue if they expose endpoints that handle object identifiers.
■ Broken Authentication enables attackers to compromise tokens or exploit implementation flaws to steal users' identities.
■ Excessive Data Exposure results from relying on the client to filter data, and, unless the client's state is controlled, servers receive too many filters which criminals can abused to access data.
■ Broken Function Level Authorization can eliminate the separation between user and administrative functions, which attackers can exploit to access administrative functions or other users' resources.
■ Mass Alignment enables attackers to guess object's properties, read documentation, explore other API endpoints and provide additional object properties in request payloads.
■ Security Misconfigurations create a wide array of vulnerabilities that attackers can exploit.
■ Injection is when an attacker sends an interpreter untrusted data to trick it into executing commands or accessing data.
■ Improper Assets Management can result in exposing more endpoints than is safe, such as debug endpoints.
The good news is that there are a number of security capabilities that Devops teams can implement to protect against these vulnerabilities and secure their apps with a layered defense model that protects against all vectors of attack. A comprehensive layered defense model has the following components:
Data Encryption
Data Encryption defense layer encrypts all of the app and API data using industry standard AES-256 encryption or government sanctioned FIPS 140-2 cryptography. In addition, best practice data encryption also secures all strings and resources in the app so that all personally identifiable information (PII), server URLs, API keys, API secrets and other sensitive are protected against credential theft.
Code Obfuscation
A comprehensive code obfuscation defense layer protects the structure, control flow and logic of the app and the APIs in the app. It does so by encrypting the binary code of the app as well as all native and non-native libraries, and making sure that any code, API URLs and static data are not accessible.
App and API Shielding
Shielding the app and its APIs hardens the mobile app and mobile APIs with anti-tampering, anti-debugging and anti-reversing protection. This will protect against fraud unauthorized distribution, API hooking and dynamic analysis.
Secure Communication
Secure communication creates trusted sessions that protect and encrypt all communications between the app, the APIs and the back-end server. This ensures the validity of all end points and any intermediate systems in between the app, the APIs and their back-end servers.
API Segmentation
Best-in-class API segmentation provides the last layer of defense to ensure that all mobile APIs are secure. By using strong authentication, API tokenization, segmented API workflows (for key and cookie stores), developers can ensure that only the right users can access specific API resources.
APIs are the heart of mobile app functionality, so it's critical to ensure that they are secure using multiple layers of security protection. By implementing measures listed above, mobile developers can prevent cybercriminals from taking advantage of the most common vulnerabilities.
Table: The OWASP API Top 10 and security measures to mitigate them
Industry News
Salt Security unveiled Salt Illuminate, a platform that redefines how organizations adopt API security.
Workday announced a new unified, AI developer toolset to bring the power of Workday Illuminate directly into the hands of customer and partner developers, enabling them to easily customize and connect AI apps and agents on the Workday platform.
Pegasystems introduced Pega Agentic Process Fabric™, a service that orchestrates all AI agents and systems across an open agentic network for more reliable and accurate automation.
Fivetran announced that its Connector SDK now supports custom connectors for any data source.
Copado announced that Copado Robotic Testing is available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).
Check Point® Software Technologies Ltd.(link is external) announced major advancements to its family of Quantum Force Security Gateways(link is external).
Sauce Labs announced the general availability of iOS 18 testing on its Virtual Device Cloud (VDC).
Infragistics announced the launch of Infragistics Ultimate 25.1, the company's flagship UX and UI product.
CIQ announced the creation of its Open Source Program Office (OSPO).
Check Point® Software Technologies Ltd.(link is external) announced the launch of its next generation Quantum(link is external) Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powered security tools designed to meet the demands of hybrid enterprises.
Salesforce and Informatica have entered into an agreement for Salesforce to acquire Informatica.
Red Hat and Google Cloud announced an expanded collaboration to advance AI for enterprise applications by uniting Red Hat’s open source technologies with Google Cloud’s purpose-built infrastructure and Google’s family of open models, Gemma.
Mirantis announced Mirantis k0rdent Enterprise and Mirantis k0rdent Virtualization, unifying infrastructure for AI, containerized, and VM-based workloads through a Kubernetes-native model, streamlining operations for high-performance AI pipelines, modern microservices, and legacy applications alike.
Snyk launched the Snyk AI Trust Platform, an AI-native agentic platform specifically built to secure and govern software development in the AI Era.