Gone in 29 Seconds: The Alarming Speed of API Vulnerability Discovery
New research reveals that newly deployed APIs are being discovered in under 30 seconds. Wallarm’s API honeypot study highlights the security risks of unmanaged APIs, with the most common attack types being CVE exploitation and discovery. It’s a race against time, and the attackers are winning—by a landslide.

Hot Take:
APIs are like unattended candy jars at a Halloween party for hackers: irresistible and dangerously inviting. With this new research, it’s clear that if your API security strategy involves crossing your fingers and hoping for the best, you might want to rethink your approach before your data disappears faster than a pizza at an IT convention.
Key Points:
- APIs can be discovered and exploited in less than 30 seconds.
- Commonly targeted ports include 80, 26657, 443, 8080, and 8443.
- The top attack types are CVE exploitation, discovery, and authentication checks.
- Over 54% of attacks target APIs versus web apps.
- Hackers can cheaply and quickly launch high-volume attacks using minimal infrastructure.
Already a member? Log in here