Wallarm (@wallarm) 's Twitter Profile
Wallarm

@wallarm

Wallarm is the fastest, easiest, most effective way to block API attacks in real-time

ID: 1658638908

linkhttps://www.wallarm.com calendar_today09-08-2013 21:44:47

1,1K Tweet

3,3K Followers

3,3K Following

Wallarm (@wallarm) 's Twitter Profile Photo

Attackers just turned the OpenAI Assistants API into their personal C2 channel. Not by exploiting it. By using it exactly as intended. Our new blog breaks down SesameOp, the backdoor malware hiding commands inside legit assistant interactions, and what this means for API and

Attackers just turned the OpenAI Assistants API into their personal C2 channel.

Not by exploiting it. By using it exactly as intended.

Our new blog breaks down SesameOp, the backdoor malware hiding commands inside legit assistant interactions, and what this means for API and
Wallarm (@wallarm) 's Twitter Profile Photo

Tired of talking politics and sports? Here are some completely unnecessary (but highly effective) ways to bring up API security at dinner. Happy Thanksgiving to our US friends celebrating today! 🦃 Drop your turkey-supply-chain API flowchart in the comments 👇

Tired of talking politics and sports? Here are some completely unnecessary (but highly effective) ways to bring up API security at dinner. 

Happy Thanksgiving to our US friends celebrating today! 🦃

Drop your turkey-supply-chain API flowchart in the comments 👇
Wallarm (@wallarm) 's Twitter Profile Photo

Wallarm is heading to Black Hat MEA from Dec 2 to 4. Find us in Hall 1, Stand T50 with our partner CyberKnight. Meet Hasan Darwish, Yaser Fahlah, and Marcel Groenewald on site. #APIsecurity #CyberSecurity #Wallarm

Wallarm is heading to Black Hat MEA from Dec 2 to 4.

Find us in Hall 1, Stand T50 with our partner CyberKnight.

Meet Hasan Darwish, Yaser Fahlah, and Marcel Groenewald on site.

#APIsecurity #CyberSecurity #Wallarm
Wallarm (@wallarm) 's Twitter Profile Photo

Stop doing generic threat models and start doing API first threat modeling that works. ⭐ Join our CISO Workshop on Dec 10 at 9 AM PT. Register: downloads.wallarm.com/4pffXlr #APIsecurity #CyberSecurity #Wallarm

Stop doing generic threat models and start doing API first threat modeling that works. ⭐

Join our CISO Workshop on Dec 10 at 9 AM PT.

Register: downloads.wallarm.com/4pffXlr

#APIsecurity #CyberSecurity #Wallarm
Wallarm (@wallarm) 's Twitter Profile Photo

It’s a nasty vulnerability and you need to patch immediately. Wallarm customers get protection out of the box, but everyone still needs to update their React-based applications now. changelog.wallarm.com/security-updat…

Wallarm (@wallarm) 's Twitter Profile Photo

A critical React RCE is being exploited, and Next.js RSC apps are also exposed. Wallarm has already blocked more than 4,100 attempts. Full breakdown and what to patch now: downloads.wallarm.com/48ltiCN #APIsecurity #Wallarm #CyberSecurity

Wallarm (@wallarm) 's Twitter Profile Photo

GuidePoint’s Atlanta Holiday Party is one week away 🎉 Wallarm’s Lee Cherry, Johanns Quiroz, and Eric Sivavec will be there. Come say hi. Register: downloads.wallarm.com/4oBb6tw #APIsecurity #CyberSecurity #Wallarm

GuidePoint’s Atlanta Holiday Party is one week away 🎉

Wallarm’s Lee Cherry, Johanns Quiroz, and Eric Sivavec will be there. Come say hi.

Register: downloads.wallarm.com/4oBb6tw

#APIsecurity #CyberSecurity #Wallarm
Wallarm (@wallarm) 's Twitter Profile Photo

Attackers are skipping APIs and breaching the tools around them. The Mixpanel incident makes that clear. Blog: downloads.wallarm.com/4oHX1KZ #APIsecurity #Wallarm #Cybersecurity

Attackers are skipping APIs and breaching the tools around them.

The Mixpanel incident makes that clear.

Blog: downloads.wallarm.com/4oHX1KZ

#APIsecurity #Wallarm #Cybersecurity
Wallarm (@wallarm) 's Twitter Profile Photo

The React Server Components RCE situation continued to evolve over the weekend. Fake PoCs, new scanning utilities, and real exploit chains all emerged over the last few days and attackers are already experimenting with bypass techniques. If you’re catching up, here’s a clear

The React Server Components RCE situation continued to evolve over the weekend.

Fake PoCs, new scanning utilities, and real exploit chains all emerged over the last few days and attackers are already experimenting with bypass techniques.

If you’re catching up, here’s a clear
Wallarm (@wallarm) 's Twitter Profile Photo

GuidePoint’s Nashville Holiday Party kicks off tomorrow. Meet Wallarm’s Lee Cherry, Johanns Quiroz, Eric Sivavec, and Marcel del Prado at the event. 🎉 Details: downloads.wallarm.com/4pYtOwl #APIsecurity #CyberSecurity #Wallarm

GuidePoint’s Nashville Holiday Party kicks off tomorrow.

Meet Wallarm’s Lee Cherry, Johanns Quiroz, Eric Sivavec, and Marcel del Prado at the event. 🎉

Details: downloads.wallarm.com/4pYtOwl

#APIsecurity #CyberSecurity #Wallarm
Wallarm (@wallarm) 's Twitter Profile Photo

APIs are multiplying rapidly in manufacturing, and even a single missed issue can disrupt production or supply chain workflows. A global manufacturer learned this the hard way when an API breach exposed gaps across internal systems. See how they fixed it and tightened their API

Wallarm (@wallarm) 's Twitter Profile Photo

Proud to share that Wallarm has been named an Edge Tech Champion for Performance by The Fast Mode! Recognition like this reflects the work our team puts in and the trust our customers place in us. Grateful for both as we head into a new year. #Wallarm #APIsecurity

Proud to share that Wallarm has been named an Edge Tech Champion for Performance by The Fast Mode!

Recognition like this reflects the work our team puts in and the trust our customers place in us. 

Grateful for both as we head into a new year.

#Wallarm #APIsecurity
Wallarm (@wallarm) 's Twitter Profile Photo

APIs are the #1 attack targets. Email topped reports in the past. But attackers follow the data flow, and that’s APIs now. Shadow endpoints, fast releases, noisy integrations… it’s where they strike. Agree or not? 👇 #APIsecurity #CyberSecurity #Wallarm

Wallarm (@wallarm) 's Twitter Profile Photo

Wallarm will be at the Future of CISO Summit & Awards in Istanbul on December 11, exhibiting with our partner Desoft. Meet the on-site team: - Hasan Darwish - Morgan Jay - James Sherlow (speaker) - Marcel Groenewald Join us at the Wyndham Grand Levent! Event info:

Wallarm will be at the Future of CISO Summit & Awards in Istanbul on December 11, exhibiting with our partner Desoft.

Meet the on-site team:
- Hasan Darwish
- Morgan Jay
- James Sherlow (speaker)
- Marcel Groenewald

Join us at the Wyndham Grand Levent! 

Event info:
Wallarm (@wallarm) 's Twitter Profile Photo

As AI takes over more decision paths, the risk surface shifts. Security leaders shared the blind spots they expect organizations to miss in 2026. Read more: downloads.wallarm.com/4rOcHiF #APIsecurity #CyberSecurity

As AI takes over more decision paths, the risk surface shifts.

Security leaders shared the blind spots they expect organizations to miss in 2026.

Read more: downloads.wallarm.com/4rOcHiF

#APIsecurity #CyberSecurity
Wallarm (@wallarm) 's Twitter Profile Photo

What a year. ⭐ Our 2025 recap is live, covering smarter sessions, real-time blocking, revenue protection, and more. Read it here: downloads.wallarm.com/4akCWae #APIsecurity #Wallarm #Cybersecurity

What a year. ⭐

Our 2025 recap is live, covering smarter sessions, real-time blocking, revenue protection, and more.

Read it here: downloads.wallarm.com/4akCWae

#APIsecurity #Wallarm #Cybersecurity
Wallarm (@wallarm) 's Twitter Profile Photo

Everyone is predicting the future of AI security. These experts focus on what will actually break first in 2026. If you want to uncover the blind spots organizations are still underestimating, read the full article below. downloads.wallarm.com/44T28RF #CyberSecurity #APIsecurity

Wallarm (@wallarm) 's Twitter Profile Photo

Security isn’t just a technical problem. It’s a leadership one. Lefteris Tzelepis on what it takes to be a modern CISO, from incident response discipline to API visibility and secure coding. Read the full CISO Spotlight: downloads.wallarm.com/4apXyxM #CyberSecurity #CISO

Security isn’t just a technical problem. It’s a leadership one.

Lefteris Tzelepis on what it takes to be a modern CISO, from incident response discipline to API visibility and secure coding.

Read the full CISO Spotlight: downloads.wallarm.com/4apXyxM

#CyberSecurity #CISO
Wallarm (@wallarm) 's Twitter Profile Photo

API attackers brought gifts again. Q3 saw a 20 percent rise in API vulns, 57 percent growth in AI-API issues, and a $41M fintech loss. Report: downloads.wallarm.com/44FYGtv #APIsecurity #Wallarm

API attackers brought gifts again.

Q3 saw a 20 percent rise in API vulns, 57 percent growth in AI-API issues, and a $41M fintech loss.

Report: downloads.wallarm.com/44FYGtv

#APIsecurity #Wallarm
Wallarm (@wallarm) 's Twitter Profile Photo

The alerts can wait. The laptop can close. Wishing you a calm, well-earned holiday break. 🎄 Happy Holidays from Wallarm. #HappyHolidays #CyberSecurity