Akto.io

Akto.io

Computer and Network Security

San Francisco, California 2,159 followers

API Security Platform in DevSecOps

About us

Akto is the best platform for appsec teams to build an enterprise-grade API security program throughout their DevSecOps pipeline. Our industry-leading suite of — API discovery, API security posture management, sensitive data exposure, and API security testing solutions enables organizations to gain visibility in their API security posture. 1,000+ appsec teams globally trust Akto for their API security needs. Akto is headquartered in San Francisco and backed by leading venture capital firms, including Accel Partners and Alumni Ventures, with angel and advisory from Tenable Founder, Notion Founder, Sentry CEO, Jim Manico, and Synack CTO, among others. Akto has been featured in Forbes, Nasdaq, Dark Reading, Venture Beat, and CSO Online as one of the cybersecurity startups to watch. Akto is a representative vendor in Gartner® Market Guide for API Protection, Gartner® Hype Cycle for APIs, and Gartner® Hype Cycle for Application Security.

Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
San Francisco, California
Type
Privately Held
Founded
2022
Specialties
API Security, DevSecOps, Application Security, Product Security , API Discovery, API Security Testing in CI/CD, API Security Posture Management, Authentication and Authorization Testing, Sensitive Data Exposure, Shift Left in DevSecOps, Real-time Threat Detection, Automated API Security Testing, OAuth and Token Management, Compliance Monitoring, Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST)

Products

Locations

  • Primary

    95 Third Street

    2nd Floor

    San Francisco, California 94103, US

    Get directions

Employees at Akto.io

Updates

  • Akto.io reposted this

    View profile for Ankita Gupta, graphic

    Co-founder and CEO at Akto.io | API Security | Application Security | DevSecOps

    It's great to see regional API Security summits happening across the country. One of them happened last week in Chicago. https://lnkd.in/gWxsBh44 Here are five learnings from the session at the summit by Aaron Bedra, CTO at DRW. 1. Implement API Firewall and block unwanted malicious requests 2. Implement rate limiting 3. Record logs for forensic analysis 4. Implement strong authentication 5. Always, always, always test at every stage of development - "scalable security is automated security." Some takeaways from the CISO Panel - starting point for API security is API Discovery - organizations need to be able to answer the question, “What APIs do I have?” - They need to include third-party APIs in the process. In my experience, of the 8 points mentioned above, the #1 struggle for most organizations is API Discovery and API Security testing automation in the pipeline.

  • Akto.io reposted this

    View profile for Ankita Gupta, graphic

    Co-founder and CEO at Akto.io | API Security | Application Security | DevSecOps

    In my conversations, I see a lot of confusion amongst folks about shadow and zombie APIs. Most use these terms interchangeably, but they are different. shadow APIs: — unknown APIs or undocumented APIs — deployed by devs without knowledge of appsec teams — eg: codebase has 300 APIs, openAPI spec has 100 APIs, shadow will be = 200 (300-100) zombie APIs: — simply unused or old APIs — old version of APIs not deprecated — eg: unused or zombie APIs: api/search/v1 ( new or used API : api/search/v2) points to note on zombie and shadow APIs: — zombie and shadow APIs can overlap — both are risks to organizations — shadow APIs pose a risk because they are missed from security reviews or testing as they are undocumented — zombie APIs pose a risk because they often have outdated security measures and are forgotten by security teams

  • View organization page for Akto.io, graphic

    2,159 followers

    We're thrilled to announce that Akto is a Silver Sponsor for the OWASP Global AppSec SF networking event, hosted by The Purple Book Community. 📅 September 26th, 5:30 - 8:30pm 📍 KPMG Building (55 2nd St, San Francisco) Join us for an exclusive evening of fine dining, engaging discussions, and networking with top cybersecurity professionals. Whether you're passionate about application security, risk management, or have a project to showcase, this is the perfect opportunity to connect and share! 👉 RSVP now: https://lnkd.in/gcdyAW8Y Let’s make this a night to remember! 🌟

    • No alternative text description for this image
  • Akto.io reposted this

    View profile for Ankita Gupta, graphic

    Co-founder and CEO at Akto.io | API Security | Application Security | DevSecOps

    17 GitLab vulnerabilities in Sep, including 4 authorization issues, 2 open redirects, and 2 input validation issues — Sep 16: authorization flaw — Sep 16: OAuth open redirect allowing account takeover. — Sep 12: CI_JOB_TOKEN vulnerability allowing attackers to hijack session tokens. — Sep 12: authenticated users can bypass variable overwrite protection via inclusion of a CI/CD template. — Sep 12: attacker can trigger a pipeline as an arbitrary user — Sep 12: sensitive dependency proxy credentials retained in GraphQL logs — Sep 12: improper input validation error — Sep 12: command injection vulnerability due to incomplete input filtering. — Sep 12: server-side request forgery (SSRF) vulnerability — Sep 12: privilege escalation vulnerability where custom roles could escalate privileges improperly due to API authorization issue — Sep 12: denial of Service (DoS) caused by sending a specific POST request, leading to service disruption. — Sep 12: Crafted URL tricking victims into trusting an attacker-controlled application. — Sep 12: Guest user able to access commit information due to API authorization issue — Sep 12: User password exposure from repository mirror configuration — Sep 12: Guest user able to access private project source code — Sep 12: OAuth open redirect under specific conditions allowing account takeover. — Sep 12: DAST scan modification vulnerability, allowing attackers to modify scans and leak sensitive variables without permissions.

    • No alternative text description for this image
  • Akto.io reposted this

    View profile for Ankita Gupta, graphic

    Co-founder and CEO at Akto.io | API Security | Application Security | DevSecOps

    Yesterday, Cybersecurity and Infrastructure Security Agency ( CISA ), along with FBI, released an alert urging Appsec teams to eliminate XSS vulnerabilities. This is CISA's 4th alert since march on eliminating vulnerabilities through the secure-by-design principles: 1. XSS - Sep 17 2. OS Command Injection 3. Directory Traversal 4. SQL Injection Interestingly, every vulnerability in the above list is of the type "Input Validation". I have a super awesome update coming on this topic by Akto.io :)

    • No alternative text description for this image
  • Akto.io reposted this

    View profile for Ankita Gupta, graphic

    Co-founder and CEO at Akto.io | API Security | Application Security | DevSecOps

    Here is another recent and interesting access control issue. Over 1000 ServiceNow instances exposed customer knowledge base because of access control issues in API endpoints. what happened? — Service now feature - knowledge base has article IDs that are incremental in the format KBXXXXXXX — A malicious actor can brute force a vulnerable endpoint by incrementing the KB number starting at KB0000001 until they find one that is unintentionally exposed - Exposed information includes PII, internal system details, user credentials, access tokens for live production systems. — Service now improved it's ACL in 2023 after an exposure report but didn't apply it to the knowledge base feature. — The KB articles were misconfigured to allow guest users or any user access to read and access sensitive information https://lnkd.in/gAXCww2x In my opinion, access control issues with multiple roles and permissions are the hardest to solve because of their complexity and wide scope. Imagine 1000+ API endpoints in an app with 10+ roles and permissions or custom roles; it would be impossible to know if even one of the API endpoints had misconfigured access control. On top of it, new API endpoints and continuous release cycles make it even harder to check for access control issues before production release continuously. The problem is massive and faced by almost every organization I speak with. We at Akto.io are solving this problem in an automated way at scale.

    Over 1,000 ServiceNow instances found leaking corporate KB data

    Over 1,000 ServiceNow instances found leaking corporate KB data

    bleepingcomputer.com

Similar pages

Browse jobs

Funding