Security News > 2021 > May > Top application security challenges: Bad bots, broken APIs, and supply chain attacks
Vanson Bourne surveyed 750 application security decision makers responsible for their organization's application development and security to get their perspectives on data breaches, top application security vulnerabilities, and the most important product capabilities needed to defend against multi-vector application attacks.
Overall, the findings indicate that more needs to be done to protect against application security threats, particularly newer threats like bot attacks, API attacks, and supply chain attacks.
Respondents identified their top application security challenges as bad bots, software supply chain attacks, vulnerability detection, and securing APIs.
44% of respondents say bot attacks contributed to a successful security breach that exploited a vulnerability in the organization's applications in the last 12 months.
"Applications have been steadily rising as one of the top attack vectors in recent years, and the rapid shift to remote work in 2020 only intensified this," said Tim Jefferson, SVP, Engineering for Data, Networks and Application Security, Barracuda.
"Organizations are struggling to keep up with the pace of these attacks, particularly newer threats like bot attacks, API attacks, and supply chain attacks, and they need help filling these gaps effectively."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/C4Dr5NCd2yc/
Related news
- Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually (source)
- New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Websites are losing the fight against bot attacks (source)
- GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- The dark side of API security (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks (source)