Answer:
Attackers can exploit insufficiently protected API endpoints by injecting malicious code through insecure endpoints.
Attackers can exploit insufficiently protected API endpoints by injecting malicious code through insecure endpoints.
You may be interested in:
Web Security MCQs - PART 2