Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Internet»The majority of internet traffic is driven by APIs, and cybercriminals are taking advantage of them
Internet

The majority of internet traffic is driven by APIs, and cybercriminals are taking advantage of them

5gantennas.orgBy 5gantennas.orgMarch 19, 2024No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


March 19, 2024hacker newsAPI security/vulnerabilities

Application programming interfaces (APIs) are the connective tissue behind digital modernization, allowing applications and databases to exchange data more effectively. His 2024 State of API Security report by Thales’ Imperva found that the majority of internet traffic in 2023 (71%) was API calls. Additionally, a typical enterprise site made an average of 1.5 billion API calls in 2023.

The sheer volume of internet traffic passing through APIs is a concern for all security professionals. Despite best efforts to implement shift-left frameworks and SDLC processes, APIs are often pushed into production before being cataloged, certified, or audited. On average, organizations have 613 API endpoints in production, but that number is rapidly growing as pressure increases to deliver digital services to customers faster and more efficiently. Over time, these APIs can become dangerous and vulnerable endpoints.

Imperva concludes in its report that APIs are now a common attack vector for cybercriminals, as they are a direct route to accessing sensitive data. In fact, a study by the Marsh McLennan Center for Cyber ​​Risk Analysis found that API-related security incidents cost businesses around the world as much as $75 billion annually.

More API calls mean more problems

Banking and online retail reported the highest volume of API calls compared to other industries in 2023. Both industries rely on large API ecosystems to provide digital services to their customers. It’s no wonder, then, that financial services, including banking, became a prime target for API-related attacks in 2023.

Cybercriminals use a variety of methods to attack API endpoints, but one common attack vector is account takeover (ATO). This attack occurs when cybercriminals gain unauthorized access to your account by exploiting a vulnerability in the API’s authentication process. In 2023, nearly half (45.8%) of all ATO attacks targeted API endpoints. These attempts are often carried out by automation in the form of malicious bots, which are software agents that perform malicious automated tasks. Successful attacks can lock customers out of their accounts, provide criminals with sensitive data, lead to revenue loss, and increase the risk of non-compliance. ATO is a concerning business risk given the value of the data that banks and other financial institutions manage for their customers.

Why mismanaged APIs are a security threat

Mitigating API security risks is a unique challenge that frustrates even the most sophisticated security teams. This problem stems from the fast pace of software development and the lack of mature tools and processes that allow developers and security teams to work more collaboratively. As a result, nearly 1 in 10 APIs are vulnerable to attacks because they were not properly deprecated, not monitored, or lacked sufficient authentication controls.

In its report, Imperva identified three common types of mismanaged API endpoints that pose security risks to organizations: shadow APIs, deprecated APIs, and unauthenticated APIs.

  • Shadow API: These are also known as undocumented or undiscovered APIs, which are APIs that are unmonitored, forgotten, and/or outside the visibility of security teams. Imperva estimates that shadow APIs account for his 4.7% of each organization’s active API collection. These endpoints are deployed for a variety of reasons, from software testing purposes to use as connectors to third-party services. Problems arise if these API endpoints are not properly cataloged or managed. Businesses should be concerned about shadow APIs because they typically have access to sensitive information, but no one knows where they reside or what they are connected to. A single shadow API can lead to compliance violations and regulatory fines, or worse, motivated cybercriminals can exploit it to access your organization’s sensitive data.
  • Deprecated APIs: Deprecating API endpoints is a natural progression in the software lifecycle. As a result, software is updated at a rapid and continuous pace, so the existence of deprecated APIs is not uncommon. In fact, Imperva estimates that deprecated APIs account for an average of 2.6% of an organization’s collection of active APIs. When an endpoint is deprecated, services that support such endpoints are updated and requests to the deprecated endpoint fail. However, if services are not updated and APIs are not removed, endpoints become vulnerable due to lack of required patches and software updates.
  • Unauthenticated API: Uncertified APIs are often introduced as a result of misconfigurations, oversights caused by a rushed release process, or the relaxation of strict certification processes to accommodate older versions of software. These APIs account for an average of 3.4% of an organization’s active API collection. The presence of unauthenticated APIs poses a significant risk to organizations as sensitive data and functionality can be exposed to unauthorized users, potentially leading to data breaches and system manipulation.

To reduce the various security risks posed by API mismanagement, we recommend conducting regular audits to identify unmonitored or unauthorized API endpoints. Continuous monitoring can help detect attempts to exploit vulnerabilities related to these endpoints. Additionally, developers should regularly update and upgrade their APIs to ensure that deprecated endpoints are replaced with more secure alternatives.

How to secure your API

Imperva provides several recommendations to help organizations improve their API security posture.

  1. Discover, classify, and inventory all your APIs, endpoints, parameters, and payloads. Use continuous discovery to always maintain an up-to-date API inventory and disclose sensitive data exposure.
  2. Identify and secure sensitive and high-risk APIs. Perform risk assessments specifically targeting API endpoints that are vulnerable to unauthorized authorization and authentication and excessive data leakage.
  3. Establish a robust monitoring system for your API endpoints to proactively detect and analyze suspicious behavior and access patterns.
  4. Adopt an API security approach that integrates a web application firewall (WAF), API protection, distributed denial of service (DDoS) prevention, and bot protection. Comprehensive mitigation options provide flexibility and advanced protection against increasingly sophisticated API threats, including business logic attacks. These threats are particularly difficult to defend against because they are unique to each API.

Was this article interesting? This article is a contribution from one of our valued partners. follow me twitter ○ You can read more exclusive content from us on LinkedIn.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSearching for data in DNA using CRISPR
Next Article Maxis and Huawei expand collaboration on 5G and advanced
5gantennas.org
  • Website

Related Posts

NATO believes Russia poses a threat to Western internet and GPS services

August 29, 2024

Mpeppe grows fast, building traction among Internet computer owners

August 29, 2024

Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.