Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wallarm

Analyzing DeepSeek's System Prompt: Jailbreaking Generative AI

DeepSeek, a disruptive new AI model from China, has shaken the market, sparking both excitement and controversy. While it has gained attention for its capabilities, it also raises pressing security concerns. Allegations have surfaced about its training data, with claims that it may have leveraged models like OpenAI’s to cut development costs. Amid these discussions, one critical aspect remains underexplored—the security of AI agents and the vulnerabilities that allow for jailbreaks.

Answers to FAQs About API Security with Wallarm #SQLInjection #APIAbuse #AttackExamples

Learn how Wallarm integrates with Kubernetes and psyllium for API security and observability using eBPF. Explore the differences between stateful and stateless attacks and real-world examples like SQL injections and API abuse. Discover why context is essential in defining attacks and how Wallarm adapts to various scenarios.

API ThreatStats Report 2025: The Convergence of AI and API Security

This is it! The 2025 Annual API ThreatStats Report! The Wallarm Research team has collected and analyzed all the API threat data for 2024 and produced this annual report, shining a spotlight on the rising threat of API attacks targeting AI applications. The latest report explores the top API threats, identifies key trends, and provides actionable insights that can help you strengthen your API Security program, with an emphasis on identifying and protecting your AI applications from API security issues. This report includes an update to our dynamic API Security Top 10 as well. In this webinar, you will learn about.

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today. According to multiple reports, OpenAI and Microsoft have been investigating whether DeepSeek improperly used OpenAI’s API to train its own AI models.

Managing API Security: False Positives and Attack Insights #AttackManagement #ThreatResponse

Discover how Wallarm empowers users to respond to API attacks with actionable tools. Learn how to create custom rules, manage false positives, and explore attacks through seamless navigation between API sessions and attack views. Simplify API security with Wallarm’s advanced features.

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

API Security's Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in the AI revolution. The bottom line is that APIs are critical to AI systems – but they are also a major reason why AI systems are vulnerable to abuse. In this blog, we’ll explore why API security is critical for the safe and ethical deployment of AI.

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data, user privacy, and other resources while streamlining compliance, preventing fraud, and establishing accountability. In fact, broken authentication is one of the leading causes of API-related breaches.