Most API vulnerabilities are fast, remote, and easy to exploit. Attackers take full advantage of these attributes.
Wallarm found that 11,053 vulnerabilities published in 2025 — 17% of the total — were API-related. Of the 245 vulnerabilities ...
API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure. In 2025, the picture ...
API security company Traceable has unveiled its 2023 State of API Security Report. In collaboration with the Ponemon Institute, the study provides a comprehensive global perspective on the state of ...
API vulnerability scanning and API penetration testing are both important methods for ensuring the security of an API, but they have distinct differences in terms of their scope, methodology and ...
Economists have widely predicted that China will fail to meet its 5.5 percent GDP growth target, blaming record youth unemployment, ballooning developer debt and ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--Cequence Security, a pioneer in API security and bot management, today announced that its CQ Prime Threat Research Team has identified a critical vulnerability ...
At RSA, Akamai puts focus on fake sites, API vulnerabilities Your email has been sent Last year, attacks using vulnerabilities in applications and application protocol interfaces reached record highs, ...
Google LLC is releasing an application programming interface that will enable developers to scan the open-source code they use for vulnerabilities and other issues. The deps.dev API, as it’s called, ...
The vulnerabilities comprise url formatting bypasses and an unrestricted file upload functionality in the API Management developer portal, according to cybersecurity firm Ermetic. Microsoft has ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results