<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>API's | Website Cyber Security</title>
	<atom:link href="https://websitecyber.com/tag/api/feed/" rel="self" type="application/rss+xml" />
	<link>https://websitecyber.com</link>
	<description>Website Cyber Security</description>
	<lastBuildDate>Thu, 26 Jan 2023 08:06:07 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png</url>
	<title>API's | Website Cyber Security</title>
	<link>https://websitecyber.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hacking APIs and Cars</title>
		<link>https://websitecyber.com/hacking-apis-and-cars/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 26 Jan 2023 08:03:20 +0000</pubDate>
				<category><![CDATA[API's]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=46235</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" /><p>You need to learn how to hack APIs in 2023. This is the future battlefront! Ignore this at your own peril.</p>
The post <a href="https://websitecyber.com/hacking-apis-and-cars/">Hacking APIs and Cars</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>API Hacking 101</title>
		<link>https://websitecyber.com/api-hacking-101/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 00:22:05 +0000</pubDate>
				<category><![CDATA[API's]]></category>
		<category><![CDATA[Applications]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=45822</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="(max-width: 150px) 100vw, 150px" /><p>In this webinar, we will cover the basics of API hacking and Security, but instead of being a defender, we're now attacking.</p>
The post <a href="https://websitecyber.com/api-hacking-101/">API Hacking 101</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Hacker Noon Cybersecurity</title>
		<link>https://websitecyber.com/hacker-noon-cybersecurity/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 06 Nov 2022 06:50:03 +0000</pubDate>
				<category><![CDATA[API's]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44916</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" /><p>Hacker Noon Cybersecurity Hacking is not a crime! Or is it? Find all about Offense and Defense dilemmas, theories, and practical's here!</p>
The post <a href="https://websitecyber.com/hacker-noon-cybersecurity/">Hacker Noon Cybersecurity</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Hacking Optus A Beginner’s Guide</title>
		<link>https://websitecyber.com/hacking-optus-a-beginners-guide/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 02:29:11 +0000</pubDate>
				<category><![CDATA[API's]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44475</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>The cyber attack on Optus was apparently so unsophisticated, some analysts say a primary school student could have pulled it off.</p>
The post <a href="https://websitecyber.com/hacking-optus-a-beginners-guide/">Hacking Optus A Beginner’s Guide</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
