VendorsWallarm
Wallarm
Cybersecurity reports and statistics published by Wallarm
8 categories5 reports
Research Reports
Reports and publications from Wallarm
Recent Statistics & Reports
Traditional API security systems can take 5-10 minutes to detect and remediate threats.
1/1/2025•
WallarmAPI SecurityThreat Detection
Newly published API endpoints are discovered by attackers in a mere 29 seconds.
1/1/2025•
WallarmAPIEndpoint
Wallarm's researchers tracked 439 AI-related CVEs, a 1,025% increase from the prior year. Nearly all (99%) were directly tied to APIs.
1/1/2025
Only 11% of AI-powered APIs implemented robust security measures, such as bearer tokens with expiration times.
1/1/2025•
AIAPIAuthentication
18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.
1/1/2025•
APILegacy SystemsExploits
Machine learning-based discovery tools often identify 31% more API endpoints than those reported by enterprises.
1/1/2025•
AIAPIVulnerability
In 2024, there was an average of three monthly API-related breach incidents—and, at times, as many as five to seven breaches each month.
1/1/2025
There was an average of three API-related breaches per month in 2024, with some months seeing as many as five to seven.
1/1/2025•
APIData BreachFrequency
57% of AI-powered APIs were externally accessible.
1/1/2025•
AIAPIExternal Accessibility
89% of AI-powered APIs relied on insecure authentication mechanisms, like static keys.
1/1/2025•
AIAPIAuthentication
34% of enterprises admit their security controls are lagging behind AI's rapid deployment.
1/1/2025•
APIMachine LearningDiscovery
Supply chain exploits accounted for 1.1% of the CISA KEV exploits.
1/1/2025•
WallarmExploitsSupply Chain
48% of enterprises report implementing specific security controls for AI deployments.
1/1/2025•
AISecurity ControlsEnterprise
More than 50% of all recorded CISA exploited vulnerabilities were API-related for the first time, a 30% increase from the year before.
1/1/2025
Only 11% of AI-powered APIs had robust security measures in place, leaving most endpoints vulnerable.
1/1/2025
Modern APIs represent over 33% of exploited vulnerabilities in CISA KEV.
1/1/2025
21.5% of AI vulnerabilities are indirectly tied to APIs, including flaws in third-party integrations.
1/1/2025•
WallarmAIVulnerability
Kernel exploits accounted for 5.4% of the CISA KEV exploits.
1/1/2025•
WallarmExploitsKernel Exploits
33.5% of the API-related exploits targeted modern APIs, like RESTful and GraphQL.
1/1/2025•
APIExploitRESTful
Showing 41-59 of 59 results