IBM 2025 Cost of a Data Breach Report: Lessons for API and AI Security
Discription

image
IBM’s 2025 Cost of a Data Breach Report offers one of the clearest and most comprehensive views yet of how AI adoption is shaping the security landscape. While breach numbers are relatively low – only 13% of organizations reported breaches involving AI models or applications – the report reveals a troubling pattern: APIs and integrations are often the real entry point, and they’re frequently under-secured. At Wallarm, we’ve been banging this drum for a while. AI security is API security, and organizations must wake up to that fact to avoid disaster. Weak API Access Controls Are the Fastest Path into AI Systems Among AI-related breaches, an overwhelming 97% lacked proper access controls. The most common attack vector was through the AI supply chain – compromised apps, APIs, or plug-ins – leading to data compromise in 60% of cases and operational disruption in 31%. Source: IBM 2025 Cost of a Data Breach Report This mirrors our own findings in the 2025 Wallarm ThreatStats report: 98.9% of AI-related vulnerabilities we tracked were API-related 89% used weak authentication, like static keys An exposed API can be the shortest path into your AI environment. If access controls are weak, attackers don’t need to target the AI model itself – they can compromise the interfaces that feed it data or deliver its output. This misalignment creates serious vulnerabilities, and organizations deploy APIs without adequate testing or monitoring. Tightening authentication and…Read More

Back to Main

Subscribe for the latest news: