DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

APJ Manufacturing Sector Suffers Highest Web Attacks Against APIs: Akamai

DigitalCIO Bureau by DigitalCIO Bureau
March 21, 2024
in News, Tech News
0
APJ Manufacturing Sector Suffers Highest Web Attacks Against APIs: Akamai
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Akamai Technologies has released a new State of The Internet (SOTI) report which highlighted that businesses, especially manufacturers in Asia-Pacific and Japan (APJ), are at great risk as cybercriminals continue to exploit APIs to conduct attacks.

Lurking in the Shadows: Attack Trends Shine Light on API Threats highlights the array of attacks that are targeting APIs and finds that 15 percent of overall web attacks in APJ targeted APIs from January through December 2023. The manufacturing sector in APJ is most at risk, having suffered the most API-targeted attacks across industries, attracting nearly one out of three (31.2 percent) of all web attacks. Akamai expects attacks to spike as the demand for API use increases, and strongly urges organizations to prioritize properly accounting for and securing their APIs – or risk suffering breaches.

APIs enable software, systems, and devices to communicate with one another, and are vital to most organizations because they have improved both employee and customer experiences. APIs are highly valuable to manufacturers as they enable the use of Industrial Internet of Things devices to increase efficiency, accelerate production, and enable real-time management of factories and inventories. Unfortunately, this digital innovation and the rapid expansion of the API economy have presented cybercriminals with new opportunities for exploitation. Successful attacks against APJ manufacturers can cause serious repercussions worldwide, given Asia’s crucial role as a global manufacturing hub.

“APIs are increasingly critical to organizations, but they are also challenged with protecting APIs effectively, as security is often not properly baked into the rapid development and deployment processes of newer technologies like APIs,” explained Reuben Koh, Security Technology and Strategy Director (APJ), Akamai. “As manufacturers use more APIs to enable real-time production monitoring, predictive maintenance, and cost optimization, they need to be more aware of the risks they are exposed to.”

Lurking in the Shadows analyzes some of the most common problem areas regarding posture and runtime challenges. Other key findings of the report include:

  • The top sectors suffering the highest percentage of web attacks that targeted APIs were manufacturing at 31.2%, followed by gaming at 25.2%, high tech at 24.4%, video media at 24.0%, and commerce at 22.3%.
  • The top five regions with the highest percentage of web attacks targeting APIs were South Korea at 47.9%, Indonesia at 39.6%, Hong Kong SAR at 38.7%, Malaysia at 26.4%, and Japan at 23.4%. This was followed by India (19.0%), Australia (15.6%), Singapore (5.8%), the Philippines (5.5%), and New Zealand (4.8%).
  • In APJ, top attack methods include Local File Inclusion (LFI) at 16.8%, Server-Side Request Forgery (SSRF) at 11.8%, and Web Attack Tool (WAT) at 10.4%. Attackers are also favoring the use of newly surfaced vectors, like CMDi at 9.1%, which underscores that adversaries are continuously finding new methods and avenues to exploit targets.
  • Business logic abuse is a critical concern as it is challenging to detect abnormal API activity without establishing a baseline for API behavior. Organizations in APJ without solutions to monitor anomalies in their API activity are at risk of runtime attacks like data scraping — a new data breach vector that uses authenticated APIs to slowly scrape data from within.
  • Bot requests are also concerning in APJ – nearly half of the more than two trillion suspicious bot requests were aimed at APIs.
  • APIs are at the heart of most digital transformations today, so it is paramount for APJ businesses to understand their industry’s trends and relevant threats, like loyalty fraud, abuse, authorization, and carding attacks.
  • Organizations in APJ need to think about compliance requirements and emerging legislation early in their security strategy process to avoid the need to re-architect. Examples include section 6 of the upcoming Payment Card Industry Data Security Standard (PCI DSS) v4.0 on new API standards.

“Companies in APJ must ensure that the APIs they use are properly discovered and documented – and have complete visibility into their purpose and the risks they bring.” said Koh. “Businesses also need to keep themselves updated on API threats – especially on emerging ones like API business logic abuse – and follow industry guidelines to protect against misconfiguration and vulnerabilities. Our new report provides key insights to help organizations leverage best practices to enhance security, as the use of APIs become more prevalent across all industries.”

Tags: Akamai Technologies h
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

by DigitalCIO Bureau
June 25, 2025
0
Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

"Firstly, this is not a new data breach. It’s the result of threat actors’ use of infostealer malware that has silently scraped usernames and passwords during breaches. This...

Read moreDetails

Ascendion Acquires Product Strategy & Transformation Firm Moodys

by DigitalCIO Bureau
June 25, 2025
0
Ascendion Leads The Charge in Generative AI

Ascendion has announced the acquisition of Moodys Northwest Consulting (Moodys), a premier product strategy and transformation firm. The move strengthens Ascendion's ability to help enterprise clients imagine, build,...

Read moreDetails

AuthBridge Unveils GroundCheck.ai for Smarter CPV

by DigitalCIO Bureau
June 25, 2025
0
AuthBridge Unveils GroundCheck.ai for Smarter CPV

AuthBridge, India's leading trust and authentication technology company, has launched GroundCheck.ai — India's first AI-powered platform purpose-built to transform Contact Point Verification (CPV) for customers, merchants, and vendors across sectors. At...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 25, 2025
0
L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

by DigitalCIO Bureau
June 23, 2025
1
Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

Our team works closely with clients to identify new revenue levers, optimize existing customer journeys, and continuously unlock incremental value. This outcome-driven partnership approach is what transforms us...

Read moreDetails
Next Post
Central Bank in US Selects TCS to Modernize its Core Technology

Central Bank in US Selects TCS to Modernize its Core Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Email Impersonation Attacks Increase by 80%

August 28, 2018
Mainframe Modernization Drives $12B Cost Savings: Kyndryl

Mainframe Modernization Drives $12B Cost Savings: Kyndryl

September 19, 2023
Tenable Discloses Exploitation of Apache Tomcat Servers by Kinsing Malware

Tenable Discloses Exploitation of Apache Tomcat Servers by Kinsing Malware

May 21, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?