Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API ThreatStats Report 2025: The Convergence of AI and API Security

This is it! The 2025 Annual API ThreatStats Report! The Wallarm Research team has collected and analyzed all the API threat data for 2024 and produced this annual report, shining a spotlight on the rising threat of API attacks targeting AI applications. The latest report explores the top API threats, identifies key trends, and provides actionable insights that can help you strengthen your API Security program, with an emphasis on identifying and protecting your AI applications from API security issues. This report includes an update to our dynamic API Security Top 10 as well. In this webinar, you will learn about.

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today. According to multiple reports, OpenAI and Microsoft have been investigating whether DeepSeek improperly used OpenAI’s API to train its own AI models.

Managing API Security: False Positives and Attack Insights #AttackManagement #ThreatResponse

Discover how Wallarm empowers users to respond to API attacks with actionable tools. Learn how to create custom rules, manage false positives, and explore attacks through seamless navigation between API sessions and attack views. Simplify API security with Wallarm’s advanced features.

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

API Security's Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in the AI revolution. The bottom line is that APIs are critical to AI systems – but they are also a major reason why AI systems are vulnerable to abuse. In this blog, we’ll explore why API security is critical for the safe and ethical deployment of AI.

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data, user privacy, and other resources while streamlining compliance, preventing fraud, and establishing accountability. In fact, broken authentication is one of the leading causes of API-related breaches.

How Attackers Exploit APIs for Rapid Data Breaches #Vulnerabilities #TechTrends #CyberThreats

Attackers now exploit APIs for rapid data breaches, taking advantage of a 96% rise in API-related vulnerabilities. Learn how realized risks (breaches) differ from unrealized risks (vulnerabilities) and why APIs are top targets. Stay informed on API security trends.

A CISO's View on Building an API Security Program in 2025

As we enter the new year, the API security landscape continues to evolve. The volume and complexity of APIs attacks has increased. CISOs and security teams should evaluate their current tools and programs for changes. In this webinar, we bring together CISOs to discuss what changes and threats should be considered in API security programs for the new year. Together, we’ll examine and discuss.