Categories: The Last Watchdog

Black Hat Fireside Chat: API sprawl turns SMBs into prime targets — simple flaws invite breaches

Cyber attackers don’t always need sophisticated exploits. Too often, they succeed by exploiting the basics.

Related: 51 common SMB cyberattacks

Sponsored

That’s the warning from Chris Wallis, founder and CEO of London-based Intruder, who sat down with Last Watchdog during Black Hat USA 2025. His company has carved out a niche helping small and mid-sized businesses, which remain chronically under-resourced when it comes to cybersecurity.

The 2022 Optus breach — triggered by a single unauthenticated API spilling customer data — prompted Wallis and his team to ask how many similar exposures might be hiding in plain sight. Their answer was Auto Swagger, a tool built to scour company systems for exposed API documentation and probe for weaknesses.

Early trials uncovered unsecured APIs at Microsoft and two other global tech firms, exposing sensitive data to anyone who knew where to look. Intruder released Auto Swagger this summer as a free resource to raise awareness and help organizations confront this overlooked risk.

Findings like these highlight a broader concern: the expanding role of APIs as companies rush to embed generative AI. Each new integration depends on APIs to connect internal systems, creating fresh pathways often deployed with little attention to security.

From my vantage point, it feels like déjà vu: unmanaged API growth is becoming the new “soft underbelly” of enterprise IT, much like shadow IT a decade ago — only more dynamic and ephemeral.

For SMBs, the stakes are acute. Cloud adoption and API sprawl have expanded their attack surfaces, while security teams are thin or nonexistent. Legacy tools, designed for large enterprises, can overwhelm rather than assist. Intruder positions its platform as a simpler, integrated alternative that scans networks, flags exposures, and helps IT managers prioritize fixes.

Sponsored

The lesson is clear: fundamentals matter. SMBs remain especially vulnerable. But the tech giants have far less excuse — and yet even they are racing to roll out powerful tools like generative AI without securing the foundations first.

For a full drill down, please give a listen to the accompanying podcast.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: API sprawl turns SMBs into prime targets — simple flaws invite breaches first appeared on The Last Watchdog.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

Pokopia made me look at Pokémon’s high-tech future in a whole new way

Pokémon Pokopia features, of all things, a 3D printer. I wasn't sure why this surprised…

16 minutes ago

Threat Actors Using Fake Claude Code Download to Deploy Infostealer

Cybercriminals have found a new way to target developers and IT professionals by setting up…

31 minutes ago

Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale

A cybercriminal group known as Funnull — previously sanctioned by the U.S. Treasury — has…

31 minutes ago

Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks

A coordinated campaign targeting cryptocurrency organizations has drawn attention from the security community, with evidence…

31 minutes ago

Jury convicts Wisconsin man in Freeport murder case

A jury found 23-year-old Christopher Scott of Monroe, Wis. guilty of first-degree murder and weapons…

41 minutes ago

Nothing Announces the Phone 4a Pro and a New Set of Over-Ear Headphones

Nothing has officially debuted the Nothing Phone 4a Pro and its new over-ear Nothing Headphone…

41 minutes ago

This website uses cookies.