Security News > 2021 > May > Top application security challenges: Bad bots, broken APIs, and supply chain attacks

Vanson Bourne surveyed 750 application security decision makers responsible for their organization's application development and security to get their perspectives on data breaches, top application security vulnerabilities, and the most important product capabilities needed to defend against multi-vector application attacks.
Overall, the findings indicate that more needs to be done to protect against application security threats, particularly newer threats like bot attacks, API attacks, and supply chain attacks.
Respondents identified their top application security challenges as bad bots, software supply chain attacks, vulnerability detection, and securing APIs.
44% of respondents say bot attacks contributed to a successful security breach that exploited a vulnerability in the organization's applications in the last 12 months.
"Applications have been steadily rising as one of the top attack vectors in recent years, and the rapid shift to remote work in 2020 only intensified this," said Tim Jefferson, SVP, Engineering for Data, Networks and Application Security, Barracuda.
"Organizations are struggling to keep up with the pace of these attacks, particularly newer threats like bot attacks, API attacks, and supply chain attacks, and they need help filling these gaps effectively."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/C4Dr5NCd2yc/
Related news
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Balancing usability and security in the fight against identity-based attacks (source)
- PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack (source)
- IPany VPN breached in supply-chain attack to push custom malware (source)
- Supply chain attack hits Chrome extensions, could expose millions (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)
- Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant' (source)
- The API security crisis and why businesses are at risk (source)
- North Korea targets crypto developers via NPM supply chain attack (source)
- New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations (source)