Skip to main content
VendorsWallarm

Wallarm

Cybersecurity reports and statistics published by Wallarm

8 categories5 reports

Recent Statistics & Reports

25% of reported security issues in Agentic AI remain open.

4/24/2025
AIAgentic AIVulnerabilities

Of the 2,869 security issues analysed in Agentic AI projects, the majority were API-related (65%).

4/24/2025
AIAgentic AIAPI

Some open security issues in Agentic AI are lingering for 1,200-plus days.

4/24/2025
AIAgentic AIVulnerabilities

Browser exploits accounted for 9.2% of the CISA KEV exploits.

1/1/2025
WallarmExploitsBrowser Exploits

12% of enterprises are waiting for security controls to be ready before deploying AI.

1/1/2025
AIEnterpriseDeployment

54% of enterprises report engaging in multiple AI deployments.

1/1/2025
AIEnterpriseDeployment

Over 53% of enterprise leaders surveyed reported engaging in multiple AI deployments.

1/1/2025

57% of AI-powered APIs were externally accessible.

1/1/2025
AIAPIExternal Accessibility

89% of AI-powered APIs relied on insecure authentication mechanisms, like static keys.

1/1/2025
AIAPIAuthentication

34% of enterprises admit their security controls are lagging behind AI's rapid deployment.

1/1/2025
APIMachine LearningDiscovery

Supply chain exploits accounted for 1.1% of the CISA KEV exploits.

1/1/2025
WallarmExploitsSupply Chain

48% of enterprises report implementing specific security controls for AI deployments.

1/1/2025
AISecurity ControlsEnterprise

More than 50% of all recorded CISA exploited vulnerabilities were API-related for the first time, a 30% increase from the year before.

1/1/2025

Only 11% of AI-powered APIs had robust security measures in place, leaving most endpoints vulnerable.

1/1/2025

Modern APIs represent over 33% of exploited vulnerabilities in CISA KEV.

1/1/2025

98.9% of AI vulnerabilities are API related.

1/1/2025
AIVulnerabilityAPI

57% of AI-powered APIs were externally accessible, and 89% relied on insecure authentication mechanisms.

1/1/2025

API-related data breaches tripled in 2024.

1/1/2025
APIData BreachSecurity

Traditional API security systems can take 5-10 minutes to detect and remediate threats.

1/1/2025
WallarmAPI SecurityThreat Detection

Mobile exploits accounted for 5.9% of the CISA KEV exploits.

1/1/2025
WallarmExploitsMobile Exploits

Showing 21-40 of 59 results