AI Security

Utility pages
AI Security OverviewAI DiscoveryAI InventoryEliminate Shadow AIAI Security Posture ManagementShift-Left AI SecurityAI Security TestingCentralized AI LoggingComplete AI Audit TrailAI Detection & Response
API Security

Utility pages
API Security OverviewAPI DiscoveryAPI InventoryAPI Security Posture ManagementShift-Left API SecurityAPI Security TestingCentralized API LoggingComplete API Audit TrailAPI Detection & Response
BlogPodcastPricing
Resources
Pages
Sales homePrimary homeAboutPricingPricing singleContactFeaturesFeatures single
BlogBlog postCareersCareers singleIntegrationsIntegrations singleTeam Member single
Utility pages
Start hereStyleguidePassword protected404 Not foundLicensesChangelogBrowse More templates
Start TrialRequest a Demo

The State of AI & API Security 2025 - FireTail's latest report on the evolving AI threat landscape.

Get Report

cloud security

All
OWASP LLM TOP 10
All
AI Security
All
Product
All
A View from the C-Suite
All
Fintech
All
cloud security
All
AI
All
Awards
All
API economy
All
podcast
All
WAF
All
Events
All
Cybersecurity
All
Cyber landscape
All
Company
All
API security
LLM03: Supply Chain
May 21, 2025

LLM03: Supply Chain

The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each risk one by one, how it manifests, and mitigation strategies. This week, we’re focusing on LLM03: Supply Chain vulnerabilities.

Read more

An open letter to FireTail customers about security and data privacy
May 8, 2025

An open letter to FireTail customers about security and data privacy

Our modern “Software as a Service” model is becoming a challenge for cybersecurity teams within large enterprises, as attacks continue to rise in volume and complexity across the cyber realm. Security needs to be a consideration from code to cloud, or any progress we make will be undone just as quickly.

Read more

LLM02: Sensitive Information Disclosure
May 8, 2025

LLM02: Sensitive Information Disclosure

OWASP’s Top 10 for LLM is a good starting point for teams to learn about AI security risks. In this series, we’ll go over each risk and practices to protect against them. Today, we’re tackling LLM02: Sensitive Information Disclosure.

Read more

The New CIS API Security Guide
April 11, 2025

The New CIS API Security Guide

It’s here! The New CIS Guide for API Security provides teams with actionable steps for their own API security postures. API use is skyrocketing with the recent adoption of AI, and security teams are struggling to keep up with the rising threats. That’s where the CIS Guide comes in.

Read more

Prompt Injection: A Deep Dive into OWASP's #1 LLM Risk
April 1, 2025

Prompt Injection: A Deep Dive into OWASP's #1 LLM Risk

In this blog, we are taking a closer look at Prompt Injection, the #1 vulnerability on the OWASP Top 10 list of LLM risks in 2025. Join us in the first of this 10-part series as we examine the root causes of prompt injection, how prompt injection attacks are carried out, and the best methods to avoid them.

Read more

Tomcat RCE Vulnerability Now Exploited in the Wild
March 20, 2025

Tomcat RCE Vulnerability Now Exploited in the Wild

Researchers recently found a vulnerability in Apache Tomcat’s servers that would allow an attacker to commit Remote Code Execution with a single PUT request to a specific API, followed by a GET. And now, this vulnerability is officially being exploited in the wild.

Read more

What We Can Learn from The New Malware Abusing Microsoft
February 18, 2025

What We Can Learn from The New Malware Abusing Microsoft

Today’s cyber landscape is littered with threats, risks, and vulnerabilities. Every week, we are seeing an increase not only in attacks, but also in the methods used to attack. This week, a new family of malware was discovered exploiting Microsoft’s Graph API.

Read more

AI & API: Double Rainbow for Cybersecurity
February 18, 2025

AI & API: Double Rainbow for Cybersecurity

AI security and API security run alongside each other, much like a double rainbow. Each one contains a full spectrum of security requirements that work in tandem with one another.

Read more

OpenAI? Also Open to Abuse
January 23, 2025

OpenAI? Also Open to Abuse

In 2025, AI is the biggest advancement in cybersecurity and the talk of all tech-sperts. But as AI continues to develop, we are seeing a surge in not only the benefits, but also the risks of artificial intelligence.

Read more

API Discovery: The Foundation of Security
December 10, 2024

API Discovery: The Foundation of Security

Many security teams are still not aware of all the APIs in their landscape. Read the latest blog from FireTail to learn about the importance of API discovery and how you can discover all the APIs in your landscape today.

Read more

The Secrets of APIs...
November 21, 2024

The Secrets of APIs...

This blog post will answer questions such as: But where do APIs live? And how do they interact? What languages do they use?

Read more

API Security: The Overlooked Threat Now Overshadowing Cloud Misconfigurations
November 20, 2024

API Security: The Overlooked Threat Now Overshadowing Cloud Misconfigurations

The latest blog from the C-suite at FireTail attempts to answer the essential question: “Which is a bigger threat today - cloud misconfigurations or API vulnerabilities?”

Read more

Better Off Apart
November 12, 2024

Better Off Apart

In a world of cyber risks, authorization is one of the most critical steps in an API security strategy. However, when it comes to authorization, the C-suite of FireTail believes it is better kept apart.

Read more

Disclosure: Multiple Vulnerabilities in Granicus eFiling Platform
October 16, 2024

Disclosure: Multiple Vulnerabilities in Granicus eFiling Platform

Granicus, a platform offering government solutions including an efiling platform called eUniversa, was recently discovered to be vulnerable to outside attack.

Read more

Star Health Data Leak: The Call is Coming from Inside the House
October 16, 2024

Star Health Data Leak: The Call is Coming from Inside the House

Star Health suffered a massive data leak via API access. The personal information of millions of victims has been compromised, and worst of all, there may have been an insider who facilitated the breach.

Read more

Ecovacs Hurl Obscenities at Unsuspecting Users
October 15, 2024

Ecovacs Hurl Obscenities at Unsuspecting Users

Ecovac customers in Australia were startled when their vacuums began talking back to them, most notably using racial slurs. This was made possible through remote access and manipulation of the “smart” devices.

Read more

Hackers Exploiting Docker Swarm, Kubernetes, & SSH Servers
October 9, 2024

Hackers Exploiting Docker Swarm, Kubernetes, & SSH Servers

Researchers from DataDog recently discovered that hacker groups are targeting Docker Swarm, Kubernetes and SSH servers in one orchestrated attack using Docker API endpoint vulnerabilities.

Read more

Versa is Vulnerable
October 1, 2024

Versa is Vulnerable

Web application and service creation platforms rely on APIs for their functionality. However, one such platform, Versa Director, is vulnerable to API attacks and token theft.

Read more

New Vulnerability could allow for Remote Takeover of KIAs…
October 1, 2024

New Vulnerability could allow for Remote Takeover of KIAs…

Researchers found a new vulnerability that affects KIA systems and could allow anyone remote control over their vehicles using only a license plate.

Read more

The Problem with APIs
September 26, 2024

The Problem with APIs

APIs are everywhere and in every part of our lives. However, in recent years, attackers have been increasingly targeting APIs. So how do you secure an API, and whose responsibility is it?

Read more

Feeld Dating App API
September 20, 2024

Feeld Dating App API

APIs are used for everything, including dating apps. Feeld, a dating app targeted at multi-person relationships, recently faced an API vulnerability that exposed sensitive data, leaving users unsettled.

Read more

Escalating from Reader to Contributor in Azure API Management
September 19, 2024

Escalating from Reader to Contributor in Azure API Management

APIs can have many different types of security challenges, even those of tech giants such as Microsoft. In this blog, we’ll explore a recent vulnerability that affected Microsoft’s Azure API Management, and explore what that implies for the cloud shared responsibility model

Read more

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare
September 10, 2024

MoveIT Breaches have Lasting Impacts on Wisconsin Medicare

In Wisconsin, nearly a million Medicare users’ personally identifiable information has been exposed as a result of the moveIT breaches of yester-year.

Read more

FireTail Selected for TechCrunch Disrupt’s Startup Battlefield 2024
September 10, 2024

FireTail Selected for TechCrunch Disrupt’s Startup Battlefield 2024

We are thrilled to announce that FireTail has been selected to compete in TechCrunch Disrupt’s prestigious Startup Battlefield 2024! Being part of this prestigious event is an honor and testament to the hard work our team has put into building a cutting-edge API security platform.

Read more

The Challenges of API Logging
August 28, 2024

The Challenges of API Logging

APIs can run almost anywhere, including any type of compute platforms and network infrastructure services on AWS. In this blog, we’ll go over the different types of compute platforms, network infrastructure services, and how they relate to your APIs and API security.

Read more

A View from The C-Suite: The New CIS API Security Guide
August 28, 2024

A View from The C-Suite: The New CIS API Security Guide

FireTail partnered with the Center for Internet Security (CIS) to create an API security community. The end result is the first draft of The CIS API Security Guide, reviewed by cybersecurity experts from around the world before its release. Read more here.

Read more

Selenium Grid Target of Malware Attack
August 2, 2024

Selenium Grid Target of Malware Attack

There is also a massive lack of awareness around APIs and API endpoints. Many developers buy 3rd party software packages without realizing that they contain a variety of APIs with their own unique vulnerabilities.

Read more

APIs and The Phantom Attack Path
July 29, 2024

APIs and The Phantom Attack Path

APIs are a shortcut to the data. They pass through quietly, creating a phantom attack path that flows through all the other layers of protection. And although cybersecurity has come a long way, there still aren’t controls to mitigate these risks.

Read more

Cloudflare’s Application Security Report
July 26, 2024

Cloudflare’s Application Security Report

Cloudflare released its latest Application Security Report, which contained some startling news. They found that nearly 7% of all web traffic is malicious. But what does this really mean?

Read more

Google Cloud Security Threat Horizons Report #10
July 23, 2024

Google Cloud Security Threat Horizons Report #10

Google Cloud Security released an updated Threat Horizons report containing information about the top security risks. Here are our notes from the report.

Read more

Life 360 Phone Number Leak
July 19, 2024

Life 360 Phone Number Leak

Location-sharing services, like much of the modern internet, are powered by APIs. Because these APIs handle personally identifiable information such as addresses, phone numbers and more, breaches in these apps can lead to serious safety issues for users everywhere.

Read more

Apache Hugegraph Under Attack
July 19, 2024

Apache Hugegraph Under Attack

With new API threats popping up every day, no one is safe from vulnerability. This is especially dangerous when it comes to large, widely used servers such as Apache HugeGraph.

Read more

Apple Leaks Location Data
July 11, 2024

Apple Leaks Location Data

Some companies position privacy as a key value proposition of their products and services. But that may not always be as true as advertised.

Read more

Cuckoo for CocoaPods
July 10, 2024

Cuckoo for CocoaPods

A researcher at EvaSec recently discovered a vulnerability in the CocoaPods ecosystem that could potentially affect an undetermined (but huge) number of web users.

Read more

New Cryptomining Campaigns Use Exposed Docker APIs
July 1, 2024

New Cryptomining Campaigns Use Exposed Docker APIs

A new type of API attack has been discovered- and it’s particularly pernicious. The target? Exposed Docker APIs. The objective? Spreading cryptojacking malware.

Read more

FireTail Using FireTail- Eating Our Own Dog Food
June 28, 2024

FireTail Using FireTail- Eating Our Own Dog Food

When Jeremy and I founded FireTail in 2022, our mission was to improve API security for everyone. And that included ourselves.

Read more

Google's GitHub Goof
June 17, 2024

Google's GitHub Goof

Google probably didn’t want this to happen. The tech giant accidentally posted a whole host of sensitive internal documents to GitHub that partly detailed the way the search engine ranks web pages.

Read more

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration
June 13, 2024

Sensitive Meeting Data Left Vulnerable to Cyber Infiltration

Let’s talk about a recent example of an API vulnerability that was exploited to gain access to data within the German government.

Read more

When the Internet Connects to You
June 10, 2024

When the Internet Connects to You

Researcher Sam Curry recently discovered some alarming vulnerabilities in his modem, a Cox Panoramic wifi gateway. It all started when he noticed an unknown IP address was copying his same HTTP requests.

Read more

What CISOs Need to Know About API Security in 2024
June 7, 2024

What CISOs Need to Know About API Security in 2024

In this talk, Jeremy will cover key knowledge from the cybersecurity landscape for CISOs in 2024. Tune in to hear valuable insights and takeaways every CISO can apply in their own security posture today. API security is the cornerstone of strong cybersecurity for CISOs.

Read more

Home Access Control APIs Leave Users in Hot Water
May 29, 2024

Home Access Control APIs Leave Users in Hot Water

A lot of our API use happens at home, in places you might not even expect. What happens when these APIs are left vulnerable?

Read more

Vulnerabilities found in Fluent Bit Logging Tool API
May 23, 2024

Vulnerabilities found in Fluent Bit Logging Tool API

Many companies use Fluent Bit, or tools built on top of the underlying fluentd package, for tracking performance, observability and system events, and create metrics and monitoring alerts. However recently, a new vulnerability has come to light on the platform.

Read more

API Security By Design
May 21, 2024

API Security By Design

API security by design is all about breaking down how security considerations can be brought into the various stages of an APIs lifecycle and simplifying the API security process from the developers’ standpoint.

Read more

Graph API Vulnerabilities on the Rise
May 20, 2024

Graph API Vulnerabilities on the Rise

Many application developers are still grappling with the integration challenge. Microsoft’s Graph API attempts to solve this problem, however, their solution comes with its own drawbacks.

Read more

Revisiting Cambridge Analytica in 2024
April 11, 2024

Revisiting Cambridge Analytica in 2024

The Cambridge Analytica Data Scandal led to the collapse of the company, court cases and massive fines for Meta. It highlighted the massive impact that technology was having on society, politics and democracy. Now, almost a decade later, we take a look at how a poorly configured API started it all.

Read more

I was Wrong about Endpoint Security
April 5, 2024

I was Wrong about Endpoint Security

Based on trends in changing compute architectures, it seemed logical that Endpoint Detection and Response companies would shrink their overall install base. Instead, EDR has evolved into Extended Detection and Response.

Read more

An Update on the Evolution of Cloud Security
March 1, 2024

An Update on the Evolution of Cloud Security

FireTail CEO, Jeremy Snyder, explores the evolution of cloud security and where we are at in 2024. Examining breaches like CapitalOne and identifying where breaches occur based on his 4 quadrant model, Jeremy looks at Platformization and how the need for end-to-end API security is more pronounced than ever.

Read more

Disclosure: Work Application Vulnerability
January 17, 2024

Disclosure: Work Application Vulnerability

FireTail CTO Riley found a web application vulnerability. He noticed when the app was open, and he had tools open, one of the requests was going to an API instead of a web application.

Read more

Disclosure: Remote Data Service
December 18, 2023

Disclosure: Remote Data Service

Various APIs belonging to a data service are leaking their Git repositories, at a backend API which contain the APIs' source code.

Read more

Disclosure: Financial Application
November 16, 2023

Disclosure: Financial Application

Unauthorized users could gain access to sensitive financial information via an application's API using the data leaked via Github.

Read more

Disclosure: European Shipping Company
September 24, 2023

Disclosure: European Shipping Company

FireTail researcher Viktor Markopoulos discovered a vulnerability in a European Shipping Company’s APIs that allowed him to download internal files without authentication.

Read more

Disclosure: Fast Food Delivery Service
August 7, 2023

Disclosure: Fast Food Delivery Service

An unauthenticated API belonging to a fast food company exposed receipts from all of its stores in India.

Read more

Pages
  • Home
  • AI Security
  • API Security
  • About
  • Contact
  • Blog
  • Resources
  • AI Incident Tracker
  • API Data Breach Tracker
  • Open Source
  • Documentation
  • Integrations
  • Changelog
  • Careers
Follow us
  • 
    LinkedIn
  • 
    YouTube
Certification & Awards
AICPA SOC 2 TYPE 2Cybertech 100 2023Blackhat Startup Spotlight Finalist
Get the FireTail newsletter
Stay informed about FireTail and API security

Copyright © 2021-2025 | FireTail Inc & subsidiaries, DBA FireTail (TM) at FireTail.io | Privacy Policy | Terms of Service | Responsible Disclosures

This site uses cookies

By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Got it!