Malicious Automation is driving API Security Breaches

In this Expert Insight,Sam Crowther, CEO and founder, Kasada, argues that removing the ability to automate against a vulnerable API is critical to preventing bot-based attacks and data leaks.

The personal information of 37 million T-Mobile customers was recently stolen through one of its application programming interfaces (APIs). While T-Mobile is in the hot seat now, Twitter, Optus, Venmo, and others were also in the spotlight not too long ago.  

API adoption is at its peak, according to a 2022 State of APIs Report, with 63% of respondents relying more on APIs in 2022 than the prior year, and 69% expecting to use even more APIs than they did in 2022. As the number continues to escalate due to the acceleration of cloud and microservices, protecting them has never been more challenging.

Podcast Episode 139: the State(s) of Right to Repair and API Insecurity on GitHub

Sam Crowther, CEO and founder, Kasada

To effectively protect against API attacks, it is important to understand why they are a target and how they can be abused. 

Why are APIs Prime Targets?

Episode 227: What’s Fueling Cyber Attacks on Agriculture ?

The explosion of APIs and the pace at which companies develop them is almost impossible to keep up with – and even harder to secure. APIs are prime attack targets because many security teams lack the capabilities to identify APIs comprehensively, much less patch them. A vulnerability in an API gives attackers access to the data underlying the service. And

Read more

Explore the site

More from the blog

Latest News