Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Everyone Knows About Broken Authorization - So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities. It features in the OWASP Top 10, AppSec conversations, and secure coding guidelines. Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) account for hundreds of API vulnerabilities every quarter. According to the 2026 API ThreatStats report, authorization issues ranked ninth in the API Top 10, “reflecting chronic difficulty in managing roles and permissions at scale.”

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure. In 2025, the picture changed. Wallarm’s 2026 API ThreatStats Report revealed that APIs are now the primary attack surface for digital business, and not because bad actors discovered new zero-days, but because of compounding failures in identity, exposure, and abuse.

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse. Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs. We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous actions, and machine-to-machine decision-making. Put simply, shadow AI is much, much riskier than shadow APIs.

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his new role as Wallarm’s Global Field CISO. It’s a position that suits him down to the ground, blending technical depth, empathy, business acumen, and, what Craig believes, the most underrated skill in cybersecurity: curiosity. Like so many of us, Craig got into cybersecurity by accident. He first learned Unix under the guidance of a mentor while transitioning out of the military.

PHISHING GOT 10X FASTER WITH AI #apisecurity #phishing #aisecurity #DevSecOps #applicationsecurity

PHISHING GOT 10X FASTER Phishing attacks sped up 10x thanks to AI what took weeks is now compressed to hours. Vulnerabilities are discovered continuously and scaled instantly Attacks became adaptive and contextual for 2025 cybersecurity In this short clip from our webinar, we break down why this is the new reality.

The Myth of "Known APIs": Why Inventory-First Security Models Are Already Obsolete

You probably think the security mantra “you can’t protect what you don’t know about” is an inarguable truth. But you would be wrong. It doesn’t hold water in today’s threat landscape. Of course, it sounds reasonable. Before you secure APIs, you must first discover, inventory, and document them exhaustively. The problem is that this way of thinking has hardened into dogma and ignores how attackers actually attack modern systems.

Manual API Security in 2026? Good Luck #apisecurity #automation #devsecops #aiautomation #api

You're still doing API security manually in 2026? 2016: 100 APIs → Could handle with smart people doing manual pen testing 2020: 1,000 APIs → Difficult but possible 2025: 10,000+ APIs → Physically impossible Long ago we did API security manually. There weren't many APIs. We had smart people. We'd do some pen testing and move on. That worked in 2016. But let's be honest—this problem is getting EXPONENTIALLY bigger. Every organization will realize: we can't do this manually anymore.

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins.

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins.