Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»API Threats Surge to 40,000 Incidents in 1H 2025
Cyber Security

API Threats Surge to 40,000 Incidents in 1H 2025

Team-CWDBy Team-CWDSeptember 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The financial services, telecoms and travel sectors were in the crosshairs of threat actors in the first half of the year, after Thales observed 40,000 incidents in the period alone.

The firm’s Imperva business analyzed data from over 4000 environments worldwide to produce its API Threat Report (H1 2025).

The report claimed that APIs now attract 44% of advanced bot traffic, which is generated by sophisticated software designed to mimic human behavior.

Among the report’s key findings are:

  • A 40% increase in credential-stuffing and account takeover attempts targeting APIs without adaptive multi-factor authentication (MFA)
  • Data scraping accounted for nearly a third (31%) of API bot activity
  • Coupon and payment fraud accounted for 26% of API attacks
  • Remote code execution (RCE) attempts accounted for 13%
  • Log4j, Oracle WebLogic and Joomla were the most targeted products

“APIs are the digital economy’s connective tissue – but that also makes them its most attractive attack surface,” said Tim Chang, VP of application security products at Thales.

“What we’re witnessing is not just the scale of attacks increasing, but a fundamental shift in how criminals operate: they don’t need to inject malware, they can simply bend your business logic against you. The requests look legitimate, but the impact can be devastating.”

Read more on API threats: 99% of Organizations Report API-Related Security Issues

Financial services accounted for 27% of API incidents in the period, followed by telecoms and ISPs (10%), travel (14%) and entertainment & arts (13%), the report noted.

Shadow APIs are still a major security blind spot, with organizations typically having 10-20% more active APIs than they think.

Thales also reported a major application-layer DDoS attack in the first half of the year, at a record-breaking 15 million requests-per-second (RPS).

The report claimed that 27% of API-focused DDoS traffic in the period was aimed at financial services targets, given that they’re heavily reliant on APIs for real-time transactions like balance checks, transfers and payment authorizations.

Chang warned that the volume and sophistication of API attacks would continue to surge in the next six months, with 2025 on track for 80,000+ incidents.

“The best time to act was yesterday – the next best time is now,” he concluded.

“Organizations must discover every live endpoint, understand its business value and protect it with context-aware, adaptive defenses if they are to safeguard revenue, trust and compliance.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHelping CISOs Speak the Language of Business
Next Article Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Children and chatbots: What parents should know

January 23, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.