Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

Why API Security is Essential for the Hospitality Sector: Safeguarding Your Guests and Your Rewards

Trust is the cornerstone of the hospitality industry. Guests rely on you to safeguard their personal data, payment information, and loyalty rewards. However, in today's digital landscape, this trust faces constant risks. APIs, which serve as the unseen connections among various systems and applications, are particularly vulnerable to cyber threats. A single flaw can compromise sensitive data and cripple your brand’s reputation.

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today. According to multiple reports, OpenAI and Microsoft have been investigating whether DeepSeek improperly used OpenAI’s API to train its own AI models.

Managing API Security: False Positives and Attack Insights #AttackManagement #ThreatResponse

Discover how Wallarm empowers users to respond to API attacks with actionable tools. Learn how to create custom rules, manage false positives, and explore attacks through seamless navigation between API sessions and attack views. Simplify API security with Wallarm’s advanced features.

Treasury Department Breach: A Crucial Reminder for API Security in the Public Sector

The recent cyber breach at the U.S. Treasury Department, linked to state-sponsored Chinese hackers, has set off alarm bells in the public sector. As the investigation continues, this incident reveals a pressing issue that all government agencies must confront: securing their APIs (Application Programming Interfaces).

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

AI-Powered Attacks Surge: 1,025% Jump in Vulnerabilities, 99% are API related

Wallarm's 2025 API ThreatStats Report offers a sweeping look at how AI deployments drive a surge in security risks. In 2024, Wallarm researchers discovered 439 AI-related CVEs-up an astonishing 1,025% from the prior year. Nearly all these flaws, 99%, point back to insecure or mismanaged APIs.

Elevating Endpoint Security: Lookout Mobile Intelligence APIs

There’s no denying that mobile devices have become essential tools for employees — they facilitate communication and boost productivity by providing access to corporate resources from virtually anywhere. But that convenience comes at a cost. The role of the mobile device, in terms of how much can be done with them and the amount of data they can give users access to in a convenient and familiar form factor, has made them indispensable to the modern workforce.

The Quiet Rise of the 'API Tsunami'

As enterprises increasingly adopt cloud-native architectures, microservices, and third-party integrations, the number of Application Programming Interfaces (APIs) has surged, creating an “API tsunami” in an organization's infrastructure that threatens to overwhelm traditional management practices. As digital services proliferate, so does the development of APIs, which allow various applications to communicate or integrate with each other and share information.