Organizations struggle to identify and manage cybersecurity risks of APIs

Insights reveal that while APIs account for the majority of Internet traffic, they remain largely unsecured.
Online Bureau
  • Updated On Jan 11, 2024 at 11:52 AM IST
Read by: 100 Industry Professionals
Reader Image Read by 100 Industry Professionals
<p>APIs are central to how applications and websites work, which makes them a rich, and relatively new, target for hackers</p>
APIs are central to how applications and websites work, which makes them a rich, and relatively new, target for hackers

Cloudflare, Inc has published its inaugural API Security and Management Report. Findings from this year's report reveal that APIs, a technology that underpins today’s most used sites and apps, are being leveraged by businesses more than ever—ultimately opening the door to more online threats than seen before. The report underscores the gap between organizations' use of APIs and their ability to safeguard the data those APIs touch.

APIs power the digital world—our phones, smartwatches, banking systems and shopping sites all rely on APIs to communicate. They can help ecommerce sites accept payments, enable healthcare systems to securely share patient data, and even give taxis and public transportation access to real-time traffic data. Nearly every business today now uses them to build and provide better sites, apps and services to consumers. However, if unmanaged or unsecured, APIs present a goldmine for threat actors to exfiltrate potentially sensitive information.

Advt
"APIs are central to how applications and websites work, which makes them a rich, and relatively new, target for hackers," said Matthew Prince, CEO and co-founder at Cloudflare. "It's vital that companies identify and protect all their APIs to prevent data breaches and secure their businesses."

Key findings from Cloudflare’s 2024 API Security and Management Report include:

Even unlikely industries see high spikes of API traffic: The seamless integrations that APIs allow for have driven organizations across industries to increasingly leverage them – some more quickly than others. The IoT, rail, bus and taxi, legal services, multimedia and games, and logistics and supply chain industries saw the highest share of API traffic in 2023.

API traffic accounts for the majority of Internet traffic: APIs dominate dynamic Internet traffic around the globe (57%), with each region that Cloudflare protects seeing an increase in usage over the past year. However, the top regions that explosively adopted APIs and witnessed the highest traffic share in 2023 were Africa and Asia.
APIs face an array of frequent and increasing threats: As with any popular business critical function that houses sensitive data, threat actors attempt to exploit any means necessary to gain access. The rise in popularity of APIs has also caused a rise in attack volume, with HTTP Anomaly, Injection attacks and file inclusion being the top three most commonly used attack types mitigated by Cloudflare.

Advt
Shadow APIs provide a defenseless path for threat actors: Organizations struggle to protect what they cannot see. Nearly 31% more API REST endpoints (when an API connects with the software program) were discovered through machine learning versus customer-provided identifiers – e.g., organizations lack a full inventory of their APIs.
DDoS mitigation solutions are one of the most effective tools to protect APIs: Regardless if an organization has full visibility of all their APIs, DDoS mitigation solutions can help block potential threats. One-third (33%) of all mitigations applied to API threats were blocked by DDoS protections already in place.

“APIs are powerful tools for developers to create full-featured, complex applications to serve their customers, partners, and employees, but each API is a potential attack surface that needs to be secured,” said Melinda Marks, Practice Director, Cybersecurity, for Enterprise Strategy Group.

“As this new report shows, organizations need more effective ways to address API security, including better visibility of APIs, ways to ensure secure authentication and authorization between connections, and better ways to protect their applications from attacks,” added Marks.
  • Published On Jan 11, 2024 at 11:52 AM IST
Be the first one to comment.
Comment Now

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles
Scan to download App