AI Security

Utility pages
AI Security OverviewAI DiscoveryAI InventoryEliminate Shadow AIAI Security Posture ManagementShift-Left AI SecurityAI Security TestingCentralized AI LoggingComplete AI Audit TrailAI Detection & Response
API Security

Utility pages
API Security OverviewAPI DiscoveryAPI InventoryAPI Security Posture ManagementShift-Left API SecurityAPI Security TestingCentralized API LoggingComplete API Audit TrailAPI Detection & Response
BlogPodcastPricing
Resources
Pages
Sales homePrimary homeAboutPricingPricing singleContactFeaturesFeatures single
BlogBlog postCareersCareers singleIntegrationsIntegrations singleTeam Member single
Utility pages
Start hereStyleguidePassword protected404 Not foundLicensesChangelogBrowse More templates
Start TrialRequest a Demo

The State of AI & API Security 2025 - FireTail's latest report on the evolving AI threat landscape.

Get Report

API economy

All
OWASP LLM TOP 10
All
AI Security
All
Product
All
A View from the C-Suite
All
Fintech
All
cloud security
All
AI
All
Awards
All
API economy
All
podcast
All
WAF
All
Events
All
Cybersecurity
All
Cyber landscape
All
Company
All
API security
Closing the Loop: Continuous API Security Testing
May 14, 2025

Closing the Loop: Continuous API Security Testing

APIs power all of the connections we take for granted in the modern internet. But as we rely on them more for new technologies like AI, securing them is harder than ever. That’s why continuous API security testing is an essential part of every cybersecurity posture.

Read more

The New CIS API Security Guide
April 11, 2025

The New CIS API Security Guide

It’s here! The New CIS Guide for API Security provides teams with actionable steps for their own API security postures. API use is skyrocketing with the recent adoption of AI, and security teams are struggling to keep up with the rising threats. That’s where the CIS Guide comes in.

Read more

Tomcat RCE Vulnerability Now Exploited in the Wild
March 20, 2025

Tomcat RCE Vulnerability Now Exploited in the Wild

Researchers recently found a vulnerability in Apache Tomcat’s servers that would allow an attacker to commit Remote Code Execution with a single PUT request to a specific API, followed by a GET. And now, this vulnerability is officially being exploited in the wild.

Read more

What We Can Learn from The New Malware Abusing Microsoft
February 18, 2025

What We Can Learn from The New Malware Abusing Microsoft

Today’s cyber landscape is littered with threats, risks, and vulnerabilities. Every week, we are seeing an increase not only in attacks, but also in the methods used to attack. This week, a new family of malware was discovered exploiting Microsoft’s Graph API.

Read more

AI & API: Double Rainbow for Cybersecurity
February 18, 2025

AI & API: Double Rainbow for Cybersecurity

AI security and API security run alongside each other, much like a double rainbow. Each one contains a full spectrum of security requirements that work in tandem with one another.

Read more

Star Health Data Leak: The Call is Coming from Inside the House
October 16, 2024

Star Health Data Leak: The Call is Coming from Inside the House

Star Health suffered a massive data leak via API access. The personal information of millions of victims has been compromised, and worst of all, there may have been an insider who facilitated the breach.

Read more

Ecovacs Hurl Obscenities at Unsuspecting Users
October 15, 2024

Ecovacs Hurl Obscenities at Unsuspecting Users

Ecovac customers in Australia were startled when their vacuums began talking back to them, most notably using racial slurs. This was made possible through remote access and manipulation of the “smart” devices.

Read more

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare
September 10, 2024

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare

In Wisconsin, nearly a million Medicare users’ personally identifiable information has been exposed as a result of the moveIT breaches of yester-year.

Read more

Selenium Grid Target of Malware Attack
August 2, 2024

Selenium Grid Target of Malware Attack

There is also a massive lack of awareness around APIs and API endpoints. Many developers buy 3rd party software packages without realizing that they contain a variety of APIs with their own unique vulnerabilities.

Read more

Google Cloud Security Threat Horizons Report #10
July 23, 2024

Google Cloud Security Threat Horizons Report #10

Google Cloud Security released an updated Threat Horizons report containing information about the top security risks. Here are our notes from the report.

Read more

Life 360 Phone Number Leak
July 19, 2024

Life 360 Phone Number Leak

Location-sharing services, like much of the modern internet, are powered by APIs. Because these APIs handle personally identifiable information such as addresses, phone numbers and more, breaches in these apps can lead to serious safety issues for users everywhere.

Read more

Apache Hugegraph Under Attack
July 19, 2024

Apache Hugegraph Under Attack

With new API threats popping up every day, no one is safe from vulnerability. This is especially dangerous when it comes to large, widely used servers such as Apache HugeGraph.

Read more

New Cryptomining Campaigns Use Exposed Docker APIs
July 1, 2024

New Cryptomining Campaigns Use Exposed Docker APIs

A new type of API attack has been discovered- and it’s particularly pernicious. The target? Exposed Docker APIs. The objective? Spreading cryptojacking malware.

Read more

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration
June 13, 2024

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration

Let’s talk about a recent example of an API vulnerability that was exploited to gain access to data within the German government.

Read more

When the Internet Connects to You
June 10, 2024

When the Internet Connects to You

Researcher Sam Curry recently discovered some alarming vulnerabilities in his modem, a Cox Panoramic wifi gateway. It all started when he noticed an unknown IP address was copying his same HTTP requests.

Read more

The State of API Security 2024
May 20, 2024

The State of API Security 2024

We're excited to announce the release of our latest State of API Security 2024 report! With the rapid adoption of microservice-based architectures, cloud-native solutions, containerization, and AI, the API attack surface is expanding faster than ever.

Read more

APIs at the Edge of Modern Cloud Apps
April 23, 2024

APIs at the Edge of Modern Cloud Apps

The cloud might be a popular talking point, but the edge of the cloud – where APIs and distributed computing intersect – is the true unsung hero of modern cloud application development and deployment. Today, we’re going to look at APIs at the edge of modern cloud applications.

Read more

APIs and Competitive Advantage in the Travel Sector
April 17, 2024

APIs and Competitive Advantage in the Travel Sector

In the travel sector, securing a competitive edge is vital. In a hyperconnected industry, where demand fluctuates, pricing is dynamic and customers have endless options, efficient and well-secured APIs can make a huge difference.

Read more

The Importance of APIs in FinTech Ecosystems
March 13, 2024

The Importance of APIs in FinTech Ecosystems

Fintech is a growing industry, and with this growth comes data. With data - and the sensitivity of the data in financial services in particular - comes the need to implement security solutions effectively at scale. Thankfully, fintech providers can turn to many readily available solutions to increase their security posture and deliver better, more secure products at scale.

Read more

Connecting the Dots: API Security for Building Modern Internet Services
February 27, 2024

Connecting the Dots: API Security for Building Modern Internet Services

The modern web is more connected than ever before. The move from monoliths to containerization and microservice-based architectures means API security is a must. In this blog, we look at what it takes to build secure modern internet services.

Read more

Disclosure: Work Application Vulnerability
January 17, 2024

Disclosure: Work Application Vulnerability

FireTail CTO Riley found a web application vulnerability. He noticed when the app was open, and he had tools open, one of the requests was going to an API instead of a web application.

Read more

 API Gateways: Great for Management but Not for Security
November 13, 2023

API Gateways: Great for Management but Not for Security

Gateways are great, but not for security. API gateways are useful when it comes to API management but they were never designed with security in mind. They can't actively monitor API traffic, they don’t see inside payloads or detect real-time manipulation. They won’t stop most API attacks.

Read more

Unsecured APIs are now a Popular Delivery Mechanism in Ransomware Attacks
November 2, 2023

Unsecured APIs are now a Popular Delivery Mechanism in Ransomware Attacks

As they continue to rise in use, APIs are becoming a critical attack surface for ransomware groups.

Read more

FireTail Now Available on AWS Marketplace
September 27, 2023

FireTail Now Available on AWS Marketplace

The addition of FireTail marks a significant milestone in our mission to provide state-of-the-art API security solutions to organizations around the world. Now, AWS customers can unleash the power of FireTail quickly, easily and confident in the knowledge that the platform integrates perfectly with their cloud environment.

Read more

Disclosure: European Shipping Company
September 24, 2023

Disclosure: European Shipping Company

FireTail researcher Viktor Markopoulos discovered a vulnerability in a European Shipping Company’s APIs that allowed him to download internal files without authentication.

Read more

API Days Connect Hong Kong
August 30, 2023

API Days Connect Hong Kong

We were delighted to have the opportunity to present at Apidays Hong Kong this year. The hybrid event was a wonderful way to connect with some of the brightest minds in API security from all across the region and our CEO, Jeremy Snyder, took to the stage to deliver a talk entitled ‘API Security: Analysis of Breaches, Attack Vectors and Strategies.’ Watch the full presentation now…

Read more

Disclosure: Fast Food Delivery Service
August 7, 2023

Disclosure: Fast Food Delivery Service

An unauthenticated API belonging to a fast food company exposed receipts from all of its stores in India.

Read more

A wave of API companies
September 7, 2022

A wave of API companies

More companies are starting as API services, boosting the API economy.

Read more

Pages
  • Home
  • AI Security
  • API Security
  • About
  • Contact
  • Blog
  • Resources
  • AI Incident Tracker
  • API Data Breach Tracker
  • Open Source
  • Documentation
  • Integrations
  • Changelog
  • Careers
Follow us
  • 
    LinkedIn
  • 
    YouTube
Certification & Awards
AICPA SOC 2 TYPE 2Cybertech 100 2023Blackhat Startup Spotlight Finalist
Get the FireTail newsletter
Stay informed about FireTail and API security

Copyright © 2021-2025 | FireTail Inc & subsidiaries, DBA FireTail (TM) at FireTail.io | Privacy Policy | Terms of Service | Responsible Disclosures

This site uses cookies

By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Got it!