In January 2023, news broke that because Twitter refused to pay a ransomware demand, hackers were set to release 235 million unique records of Twitter users, complete with their email addresses and phone numbers. Twitter has confirmed that the data breach was caused when hackers used a zero-day API vulnerability to collect data by submitting an email address or phone number, verifying that it is associated with a Twitter account, and retrieving the associated account ID.

As cloud native app development explodes, so does the world of refactoring monolithic apps into hundreds and thousands of APIs and microservices.”

Gartner’s most recent cloud native survey found that organizations are incorporating other application security testing (AST) solutions such as software composition analysis (SCA), interactive application security testing (IAST), and API testing in addition to static application security testing (SAST) and web application firewalls (WAF).

An advanced https://www.synopsys.com/software-integrity/security-testing/interactive-application-security-testing.htmlsuch as Seeker by Synopsys is unique and useful in securing cloud native apps.

Related Articles