Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild

A devastating new remote code execution (RCE) vulnerability, CVE-2025-24813, is now actively exploited in the wild. Attackers need just one PUT API request to take over vulnerable Apache Tomcat servers. The exploit, originally published by a Chinese forum user iSee857, is already available online: CVE-2025-24813 PoC by iSee857.

Beyond Checkboxes: The Essential Need for Robust API Compliance

APIs serve as essential links in today’s digital infrastructure, enabling data sharing and application integration. However, their widespread use has made them prime targets for attackers. Hence, strict compliance with security regulations is not just optional; it is imperative for business success. The increasing frequency of data breaches and the sophistication of cyber threats highlight the pressing need for strong API security.

AI Security = API Security: 10x Surge in AI-Related CVEs #AIExploits #APIAttacks #SecureAI

AI-driven applications rely on APIs, making them a prime target for attackers. In 2024, AI-related CVEs increased 10x, with 98.6% of vulnerabilities linked to APIs. As AI agents interact with systems via APIs, security risks grow. Learn why securing AI means securing APIs.

Secure Your AI: Protecting Agentic AI in an API-Driven World

As enterprises embrace agentic AI for transformative business opportunities, they face a critical challenge: ensuring these intelligent systems operate securely. Wallarm, the leader in API-first security, invites you to an exclusive webinar to explore how to safeguard AI agents, APIs, and sensitive data from emerging threats. Learn how to protect your AI ecosystem and ensure business continuity with actionable insights from Wallarm Security Lab. Discover why 90% of agentic AI deployments are vulnerable and how to defend them.

Bringing Shadow and Zombie APIs to Light

Application Programming Interfaces (APIs) have revolutionized connectivity and data sharing, but their pervasiveness has also created a new set of cybersecurity challenges. As businesses continually expand and update their applications, they often overlook APIs left behind by developers — shadow and zombie APIs — that continue to operate undetected. These abandoned APIs become silent risks, operating in the background, unknown to most security teams, and they can pose serious security threats.

API Security Pricing: Complete Guide

Picture a company like a global logistics platform. On a regular Tuesday morning, shipments are crossing continents when the tracking updates suddenly stop. Then, delivery routes are rerouted by themselves, and thousands of customers are left with no information. A single exposed API endpoint or an authentication check that was left incomplete had drastic consequences for this company.

API Security Failures: What Went Wrong at Dell & Twilio? #APIBreach #DataLeak #DellHack

Major companies like Dell and Twilio suffered API breaches due to poor validation, broken access control, and missing rate limits. Dell’s 49M records were exposed at 5000 requests per minute, while Twilio’s API leak allowed attackers to validate accounts. Learn how insecure API views lead to massive data breaches—and how to protect your APIs.