VendorsWallarm
Wallarm
Cybersecurity reports and statistics published by Wallarm
8 categories5 reports
Research Reports
Reports and publications from Wallarm
Recent Statistics & Reports
25% of reported security issues in Agentic AI remain open.
4/24/2025•
AIAgentic AIVulnerabilities
Of the 2,869 security issues analysed in Agentic AI projects, the majority were API-related (65%).
4/24/2025•
AIAgentic AIAPI
Some open security issues in Agentic AI are lingering for 1,200-plus days.
4/24/2025•
AIAgentic AIVulnerabilities
Browser exploits accounted for 9.2% of the CISA KEV exploits.
1/1/2025•
WallarmExploitsBrowser Exploits
12% of enterprises are waiting for security controls to be ready before deploying AI.
1/1/2025•
AIEnterpriseDeployment
54% of enterprises report engaging in multiple AI deployments.
1/1/2025•
AIEnterpriseDeployment
Over 53% of enterprise leaders surveyed reported engaging in multiple AI deployments.
1/1/2025
57% of AI-powered APIs were externally accessible.
1/1/2025•
AIAPIExternal Accessibility
89% of AI-powered APIs relied on insecure authentication mechanisms, like static keys.
1/1/2025•
AIAPIAuthentication
34% of enterprises admit their security controls are lagging behind AI's rapid deployment.
1/1/2025•
APIMachine LearningDiscovery
Supply chain exploits accounted for 1.1% of the CISA KEV exploits.
1/1/2025•
WallarmExploitsSupply Chain
48% of enterprises report implementing specific security controls for AI deployments.
1/1/2025•
AISecurity ControlsEnterprise
More than 50% of all recorded CISA exploited vulnerabilities were API-related for the first time, a 30% increase from the year before.
1/1/2025
Only 11% of AI-powered APIs had robust security measures in place, leaving most endpoints vulnerable.
1/1/2025
Modern APIs represent over 33% of exploited vulnerabilities in CISA KEV.
1/1/2025
98.9% of AI vulnerabilities are API related.
1/1/2025•
AIVulnerabilityAPI
57% of AI-powered APIs were externally accessible, and 89% relied on insecure authentication mechanisms.
1/1/2025
API-related data breaches tripled in 2024.
1/1/2025•
APIData BreachSecurity
Traditional API security systems can take 5-10 minutes to detect and remediate threats.
1/1/2025•
WallarmAPI SecurityThreat Detection
Mobile exploits accounted for 5.9% of the CISA KEV exploits.
1/1/2025•
WallarmExploitsMobile Exploits
Showing 21-40 of 59 results