Most API vulnerabilities are fast, remote, and easy to exploit. Attackers take full advantage of these attributes.
Allocating capital to autonomous security platforms outperforms traditional consultant-driven validation models.
Bot attacks are one of the most common threats you can expect to deal with as you build your site or service. One exposed ...
API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure.  In 2025, the picture ...
Wallarm released today The 2026 API ThreatStats Report, a data-driven analysis of API attack telemetry, published vulnerabilities, confirmed exploitation, and API-related breaches disclosed in 2025.
Wallarm found that 11,053 vulnerabilities published in 2025 — 17% of the total — were API-related. Of the 245 vulnerabilities ...
Researchers say threat actors used the sophisticated — and unfortunately named — toolkit to target high-value networks for ...
Organizations in every industry have been investing in agentic AI to unlock its productivity and efficiency gains. In fact, a recent PWC study found that 79% of businesses are using AI agents in at ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence.
OpenAI launches EVMbench to test AI agents on smart contract security days after Claude Opus 4.6-assisted code triggered a $1.78M DeFi exploit.
OpenAI introduces EVMbench to measure AI crypto security. Benchmark evaluates detection, patching and exploit skills. OpenAI has launched a benchmarking system called EVMbench to evaluate how ...
Critical CVE-2026-2329 flaw in Grandstream GXP1600 VoIP phones enables unauthenticated RCE, call interception, and credential theft.