Security News > 2021 > December > Online shopping at risk: Mobile application and API cyber attacks at critical high
Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome.
Focusing on mobile application and API protection Two-thirds of respondents report that focusing on mobile application and API protection is a key priority for the next 12 months.
Businesses are prioritizing protection against three types of online fraud: Card fraud, inventory fraud, and account fraud.
Respondents reported that protection from online fraud, particularly in the form of card fraud, inventory fraud, and account fraud, is of critical importance.
These attacks impact the entire value chain, from employee to customer: 45% of surveyed respondents reported the cost of man-hours spent mitigating attacks as the top impact, followed by loss of revenue, and loss of customer trust.
For good reason: regardless of attack types and detection mechanisms, the majority of attacks require active intervention and overwhelmingly target high-profile events or promotions - which can be very costly for online commerce companies.
News URL
https://www.helpnetsecurity.com/2021/12/16/mobile-application-api-protection/
Related news
- Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online (source)
- Cleo patches critical zero-day exploited in data theft attacks (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- CISA confirms critical Cleo bug exploitation in ransomware attacks (source)
- Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks (source)
- CISA warns of critical Oracle, Mitel flaws exploited in attacks (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)