APIs are the main target of web attacks in 2025 - are you ready?

10 Jul 2025

APIs are the main target of web attacks in 2025 - are you ready?

Akamai's latest research brings a clear message: global web attacks have increased by 33% in the past year. And now, APIs have officially become the primary target of attackers. Numbers like these don't come as mere statistics, they are an alarm that relying on old security approaches will no longer be enough. The world is changing and so is the way hackers operate.


Why are APIs the target of attacks?


Because APIs are the "express lane" to internal data and systems. Behind the convenience of services like mobile banking, e-commerce checkouts, and app logins, there are APIs running behind the scenes, often unprotected. Attacks on APIs are not frontal; they are subtle, automated, and often undetectable. Akamai noted a significant increase in the following types of attacks:

  • Credential stuffing via login API

  • API enumeration for endpoint exploration

  • Business logic abuse to infiltrate without a trace

  • Shadow API exploitation can attack undocumented APIs


What Could Happen If Left Unchecked?


Leakage of sensitive data due to lack of cybernetic protection DDoS attacks cause errors resulting in unstable applications and excessive bot traffic. Unscheduled downtime Even though all systems "look normal" Reputation fades overnight due to undetected breaches. Regulatory fines and loss of clients

Akamai Solution: Modern, Real-Time API Protection


To address this new generation of attacks, Akamai offers a suite of globally proven API Security solutions, used by thousands of enterprises including the financial, government, and e-commerce sectors:

  1. Akamai App & API Protector: Provides DDoS, bot, and exploit protection with real-time API requests. Features: Machine learning-based anomaly detection, Automatic protection against abuse and injection, Deep analytics for full visibility into API traffic

  2. Akamai Bot Manager: Filter API logins and prevent credential stuffing by spoofing malicious traffic without disturbing real users.

  3. API Discovery & Visibility: Acquire hidden APIs with visual shadow API dashboards and real-time alerts. Often the backdoor to attacks. Next Steps Always be alert and vigilant. In the face of increasingly complex API attacks, implementing proactive defenses is a must. Anticipate as an audience member in a live demo of Akamai solutions.


Perkom: A Technology Partner Ready to Protect Your API


As a trusted technology partner, Perkom delivers Akamai API Security solutions that can be customized to suit your infrastructure needs and business scale.

We help you:

  • Identify risks in active and hidden APIs

  • Implement real-time protection with Akamai

  • Ensure compliance & seamless integration without disrupting existing systems

Don't wait to be attacked. As API attacks increase dramatically and become more complex, proactive security is not an option but a necessity. Free consultation, API audit, or live demo of Akamai solutions.


Author: Ghea Devita

Marketing Communication, PT Perkom Indah Murni.

get in touch with our team

Trusted by more than 2,500 customers

we’re delivering the best
customer experience