Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says G

March 18, 2026

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

March 18, 2026

A Guide to Attack Surface Reduction

March 18, 2026
Facebook X (Twitter) Instagram
Wednesday, March 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Average Number of Daily API Attacks Up 113% Annually
Cyber Security

Average Number of Daily API Attacks Up 113% Annually

Team-CWDBy Team-CWDMarch 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


APIs now represent the “dominant” attack surface for global organizations, with 87% registering a related security incident last year, according to Akamai.

Now in its 12th year, the security vendor’s latest State of the Internet (SOTI) report was produced from analysis of its own data.

The average number of API attacks per organization in 2025 was 258, up 113% from 121 in 2024, it found. Some 61% of API attacks last year involved unauthorized workflows and abnormal activity, up from 30% in 2024. Akamai said this indicates a shift from traditional web-based to behavior-based attacks.

Of the OWASP Top API Security Risks, security misconfigurations (40%), broken object property level authorization (35%) and broken authentication (19%) were the most frequently exploited vulnerabilities.

Akamai also warned that the growth of agentic AI is amplifying the risk of sensitive data exposure. An average of 3000 APIs per customer contained sensitive data last year, with 12% showing security weaknesses and a quarter (24%) of those issues related to sensitive data exposure.

“Since AI depends on APIs for integration and data exchange, the volume of sensitive information traversing these interfaces has increased exponentially,” the report noted. “In today’s AI-driven environment, securing AI truly starts with securing APIs.”

Read more on API security: 99% of Organizations Report API-Related Security Issues.

More generally, AI is helping threat actors to automate and accelerate attacks, as well as creating new vulnerabilities (eg vibe coding) that attackers can exploit.

“Attackers increasingly focus on degrading performance, driving up infrastructure costs, and exploiting AI-driven automation at scale, rather than seeking headline-grabbing campaigns,” said Patrick Sullivan, CTO of security strategy at Akamai.

“Automation and AI are making these sophisticated campaigns cheap, repeatable, and fast. And as enterprises invest heavily in AI transformation, attackers are targeting the APIs that power that transformation.”

The Emergence of Blended Attacks

Akamai also pointed to a growth in the number of coordinated attacks that blend API abuse, web application attacks and Layer 7 DDoS activity. Web app attacks surged in volume by 73% between 2023 and 2025, while Layer 7 DDoS attacks increased 104% over the past three years.

The latter are being fuelled by easy access to DDoS-for-hire services/botnets and AI-enabled attack scripts that streamline targeting of APIs and web applications, Akamai claimed.

The vendor had the following recommendations for CISOs:

  • Gain visibility into the environment as a prerequisite for tackling DDoS, app and API attacks
  • Deploy an “integrated platform” of security controls that can be adjusted according to the risk tolerance of leadership
  • Invest in people and processes via training and validation exercises
  • Reference industry best practices when talking to the board or the infosec team – eg use OWASP to help prioritize training, deploy security controls, drive red and blue team pen testing, and analyze vulnerabilities
  • Use detailed industry reports to validate that current security controls are fit for purpose
  • Coordinate protection across DDoS mitigation, WAF, API security, bot and abuse prevention, and identity-aware controls – don’t treat these as isolated areas



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCursorJack’ Attack Path Exposes Code Execution Risk in AI Development
Next Article A Guide to Attack Surface Reduction
Team-CWD
  • Website

Related Posts

Cyber Security

Companies House Web Glitch Exposes Corporate Details to Fraudsters

March 17, 2026
Cyber Security

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

March 16, 2026
Cyber Security

Why the EU Vulnerability Database Is a Blueprint For The Future

March 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What parents should know to protect their children from doxxing

November 28, 2025

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.