Answer:
Attackers can leverage vulnerable APIs by manipulating them to transfer sensitive data between systems, contributing to data exfiltration.
Attackers can leverage vulnerable APIs by manipulating them to transfer sensitive data between systems, contributing to data exfiltration.
You may be interested in:
Web Security MCQs