Skip to main content
Back to Home

18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.

January 1, 2025

18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems. — This cybersecurity statistic was published by Wallarm in January 2025. It covers topics including API, Legacy Systems, Exploits, Security. The original data appears in 2025 API ThreatStats Report. For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 1/1/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems. This data was published by Wallarm and covers API, Legacy Systems, Exploits, Security.

Where does this data come from?

This statistic comes from 2025 API ThreatStats Report, published by Wallarm on January 1, 2025. You can view the original report at Wallarm Annual 2025 API ThreatStats Report.

What cybersecurity topics does this cover?

This statistic relates to API, Legacy Systems, Exploits, Security. Browse more statistics on API or from Wallarm.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights