Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploiting API4 - 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial of Service (DoS) and resource abuse. But despite being just one category, attackers can exploit it in many different ways; from large file uploads and expensive GraphQL queries to abuse of metered third-party services like SMS gateways or AI/LLM APIs.

Sensitive Data Leaks: What You Don't Know Can Hurt You #dataleak #sensitivedata #dataprotection

Sensitive data isn’t always obvious attackers can find and exploit information you never realized was exposed via your APIs. In this clip, Wallarm and Oracle experts explain how insurance policies, business documents, or hidden fields can become valuable targets. Learn why broad data discovery and smarter controls are critical to protect your APIs from unexpected leaks.

Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure

With innovation comes risk. As organizations race to build AI-first infrastructure, security is struggling to keep pace. Multi-Agentic Systems – those built on Large Language Models (LLMs) and Multi-Component Protocols (MCP) - bring immense potential, but also novel vulnerabilities that traditional tools weren’t designed to handle.

IBM 2025 Cost of a Data Breach Report: Lessons for API and AI Security

IBM’s 2025 Cost of a Data Breach Report offers one of the clearest and most comprehensive views yet of how AI adoption is shaping the security landscape. While breach numbers are relatively low – only 13% of organizations reported breaches involving AI models or applications – the report reveals a troubling pattern: APIs and integrations are often the real entry point, and they’re frequently under-secured. At Wallarm, we’ve been banging this drum for a while.

Why Authorization Is Still the Weakest Link in API Security? #apisecurity #authorization #zerotrust

Even as authentication improves, broken authorization remains one of the most exploited vulnerabilities in APIs. In this clip, Wallarm and Oracle experts discuss real-world authorization flaws—including how missing or weak access checks can let attackers access sensitive data and functions. Learn why robust, field-level authorization is essential to protecting your APIs.

Modern APIs, Modern Threats: Why WAFs and API Gateways Aren't Enough

APIs are the connective tissue of today’s digital ecosystems, driving innovation, automation, and business growth. But as APIs grow in complexity and volume, they’ve become prime targets for sophisticated and targeted attacks. Attackers are using threat vectors like business logic which bypass traditional tools like WAFs and API Gateways. In this webinar, we’ll explore why modern API security demands more than legacy defenses and how a dedicated API security solution is essential for protecting against today’s most advanced threats.

How a Real Crypto API Exploit Let Users Change Asset Types #CryptoSecurity #CryptoExchange #crypto

A real-world API vulnerability let a user change the asset type in a major crypto exchange—bypassing expected controls. Watch how a simple tweak to API parameters enabled unauthorized trades and exposed critical flaws. Learn why detailed schema validation and input checks are essential for protecting sensitive financial APIs.

Shadow APIs: The Blind Spot Putting Your Security at Risk #ShadowAPIs #APIDiscovery #devsecops

Shadow APIs those undocumented, forgotten, or hidden endpoints are one of today’s biggest cybersecurity risks. If you don’t know what APIs you have, you can’t protect them. Wallarm and Oracle experts explain why a complete and up-to-date API inventory is the foundation of modern security, and how missing even a single API can open the door for attackers.

How AI Makes APIs Even More Dangerous #apirisks #aisecurity #airisks #ai

AI and agent-based technologies are accelerating the use—and the risk—of APIs. Experts from Wallarm and Oracle explain how every new AI app or agent can instantly connect to dozens of APIs, multiplying your attack surface. Learn why the combination of AI and APIs is creating new security challenges you can't ignore.

Why Are APIs Easier to Attack Than Apps?#apiattacks #apisecurity #pentest #nist

Discover why over 70% of application attacks now target APIs instead of web apps. Learn from Wallarm and Oracle experts how automation, low entry barriers, and the rapid growth of APIs have changed the security landscape—and what you need to know to protect your organization.