Syndicated Blog

Wallarm
Advanced API Security

CISO Spotlight: Rick Bohm on Building Bridges, Taming AI, and the Future of API Security

| | API security
Nestled in a log cabin high in the Rocky Mountains, Rick Bohm starts his day the same way he’s approached his career: intentionally, with a quiet commitment to learning and action. Boasting ...
Addressing API Security with NIST SP 800-228

Addressing API Security with NIST SP 800-228

| | API security
According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as ...
Mirror Mirror TPRM Edit ft. Professor Eclectiqus by eclectiqus

CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape

| | API security
Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel and MLS, member of the World Economic Forum, drummer, and board member ...
A screenshot of a graph  AI-generated content may be incorrect.

Attackers Abuse TikTok and Instagram APIs

| | API security
It must be the season for API security incidents. Hot on the heels of a developer leaking an API key for private Tesla and SpaceX LLMs, researchers have now discovered a set ...
Mapping the Future of AI Security

Mapping the Future of AI Security

| | API security
AI security is one of the most pressing challenges facing the world today. Artificial intelligence is extraordinarily powerful, and, especially considering the advent of Agentic AI, growing more so by the day ...
Developer Leaks API Key for Private Tesla, SpaceX LLMs

Developer Leaks API Key for Private Tesla, SpaceX LLMs

| | API security
In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API key remained exposed for nearly two months, is a stark reminder of ...
The Ongoing Risks of Hardcoded JWT Keys

The Ongoing Risks of Hardcoded JWT Keys

| | API security
In early May 2025, Cisco released software fixes to address a flaw in its IOS XE Software for Wireless LAN Controllers (WLCs). The vulnerability, tracked as CVE-2025-20188, has a CVSS score of ...
API Discovery

API Threat Trends: How Attackers Are Exploiting Business Logic

| | API security
As businesses rely more on APIs, attackers are quick to turn that trust into opportunity. Among the most dangerous and difficult-to-detect threats are business logic exploits, which let cybercriminals manipulate legitimate functionality ...
The API Imperative: Securing Agentic AI and Beyond

The API Imperative: Securing Agentic AI and Beyond

| | API security
We recently released The Rise of Agentic AI, our API ThreatStats report for Q1 2025, finding that evolving API threats are fueled by the rise of agentic AI systems, growing complexity in cloud-native ...
Threat Replay Testing: Turning Attackers into Pen Testers

Threat Replay Testing: Turning Attackers into Pen Testers

| | API security
API security is no longer just a concern; it’s a critical priority for businesses. With APIs serving as the backbone of modern applications, they’ve become a primary target for attackers. While automated ...