Skip to main content
VendorsWallarm

Wallarm

Cybersecurity reports and statistics published by Wallarm

8 categories5 reports

Recent Statistics & Reports

Traditional API security systems can take 5-10 minutes to detect and remediate threats.

1/1/2025
WallarmAPI SecurityThreat Detection

Newly published API endpoints are discovered by attackers in a mere 29 seconds.

1/1/2025
WallarmAPIEndpoint

Wallarm's researchers tracked 439 AI-related CVEs, a 1,025% increase from the prior year. Nearly all (99%) were directly tied to APIs.

1/1/2025

Only 11% of AI-powered APIs implemented robust security measures, such as bearer tokens with expiration times.

1/1/2025
AIAPIAuthentication

18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.

1/1/2025
APILegacy SystemsExploits

Machine learning-based discovery tools often identify 31% more API endpoints than those reported by enterprises.

1/1/2025
AIAPIVulnerability

In 2024, there was an average of three monthly API-related breach incidents—and, at times, as many as five to seven breaches each month.

1/1/2025

There was an average of three API-related breaches per month in 2024, with some months seeing as many as five to seven.

1/1/2025
APIData BreachFrequency

57% of AI-powered APIs were externally accessible.

1/1/2025
AIAPIExternal Accessibility

89% of AI-powered APIs relied on insecure authentication mechanisms, like static keys.

1/1/2025
AIAPIAuthentication

34% of enterprises admit their security controls are lagging behind AI's rapid deployment.

1/1/2025
APIMachine LearningDiscovery

Supply chain exploits accounted for 1.1% of the CISA KEV exploits.

1/1/2025
WallarmExploitsSupply Chain

48% of enterprises report implementing specific security controls for AI deployments.

1/1/2025
AISecurity ControlsEnterprise

More than 50% of all recorded CISA exploited vulnerabilities were API-related for the first time, a 30% increase from the year before.

1/1/2025

Only 11% of AI-powered APIs had robust security measures in place, leaving most endpoints vulnerable.

1/1/2025

Modern APIs represent over 33% of exploited vulnerabilities in CISA KEV.

1/1/2025

21.5% of AI vulnerabilities are indirectly tied to APIs, including flaws in third-party integrations.

1/1/2025
WallarmAIVulnerability

Kernel exploits accounted for 5.4% of the CISA KEV exploits.

1/1/2025
WallarmExploitsKernel Exploits

33.5% of the API-related exploits targeted modern APIs, like RESTful and GraphQL.

1/1/2025
APIExploitRESTful

Showing 41-59 of 59 results