ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The APIsec security testing platform discovers the most serious API vulnerabilities that lead to data theft and compromise. APIsec automatically creates and runs thousands of attack playbooks, custom-generated for each unique API, to find security vulnerabilities and data logic flaws BEFORE production. The zero-touch deployment model requires no source code access, no agents, and nothing inline. APIsec runs at the speed of DevOps, alerting security teams and developers immediately of new vulnerabilities in the CI/CD pipeline, ensuring all API code is continuously validated.

APIsec A.I CyberSecurity Scoring

APIsec

Company Details

Linkedin ID:

apisec

Employees number:

45

Number of followers:

8,132

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

apisec.ai

IP Addresses:

0

Company ID:

API_1345066

Scan Status:

In-progress

AI scoreAPIsec Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/apisec.jpeg
APIsec IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAPIsec Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/apisec.jpeg
APIsec IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

APIsec Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
APIsecBreach8544/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: APIsec, a company specializing in API security testing, exposed sensitive customer data through an unprotected internet-connected database. Upon discovery by UpGuard, it was found that the database contained names, email addresses, and details pertaining to the API security of its clients, including the status of 2FA activation. Initially downplayed by APIsec as 'test data', evidence confirmed real-world customer information was included. The company later notified affected parties although the extent of the breach was not disclosed.

APIsec
Breach
Severity: 85
Impact: 4
Seen: 4/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: APIsec, a company specializing in API security testing, exposed sensitive customer data through an unprotected internet-connected database. Upon discovery by UpGuard, it was found that the database contained names, email addresses, and details pertaining to the API security of its clients, including the status of 2FA activation. Initially downplayed by APIsec as 'test data', evidence confirmed real-world customer information was included. The company later notified affected parties although the extent of the breach was not disclosed.

Ailogo

APIsec Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for APIsec

Incidents vs IT Services and IT Consulting Industry Average (This Year)

APIsec has 33.33% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

APIsec has 26.58% more incidents than the average of all companies with at least one recorded incident.

Incident Types APIsec vs IT Services and IT Consulting Industry Avg (This Year)

APIsec reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — APIsec (X = Date, Y = Severity)

APIsec cyber incidents detection timeline including parent company and subsidiaries

APIsec Company Subsidiaries

SubsidiaryImage

The APIsec security testing platform discovers the most serious API vulnerabilities that lead to data theft and compromise. APIsec automatically creates and runs thousands of attack playbooks, custom-generated for each unique API, to find security vulnerabilities and data logic flaws BEFORE production. The zero-touch deployment model requires no source code access, no agents, and nothing inline. APIsec runs at the speed of DevOps, alerting security teams and developers immediately of new vulnerabilities in the CI/CD pipeline, ensuring all API code is continuously validated.

Loading...
similarCompanies

APIsec Similar Companies

Akkodis

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

IGT Solutions

IGT Solutions is a next-gen customer experience (CX) company, defining and delivering AI-led transformative experiences for the global and most innovative brands using digital technologies. With the combination of Digital and Human Intelligence, IGT becomes the preferred partner for managing end-to-

Persistent Systems

We are an AI-led, platform-driven Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry expertise to help our clients anticipate what’s next. Our offerings and proven solutions create a unique competitive advantage for our clients by giving them th

Zoom

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by buildi

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation s

Reply

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a

Infosys

Infosys is a global leader in next-generation digital services and consulting. We enable clients in more than 50 countries to navigate their digital transformation. With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg

Accenture in India

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w

newsone

APIsec CyberSecurity News

November 25, 2025 08:00 AM
As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact

At 18 years old, cybersecurity researcher Bandana Kaur sits squarely in the middle of Generation Z, the 13- to 28-year-olds who have — or...

September 19, 2025 07:00 AM
Top 10 Best API Security Testing Tools in 2026

Best API Security Testing Tools : 1. Salt Security 2. Traceable 3. Imperva 4. APIsec 5. StackHawk 6. Akto.io 7. F5 8. Cequence Security.

July 22, 2025 07:00 AM
New APIsec University Training Modules Now Available in KnowBe4’s Diamond Library

We're excited to announce the addition of six new training modules from APIsec University, now available at the Diamond level in KnowBe4's...

May 30, 2025 07:00 AM
Your KnowBe4 Fresh Content Updates from May 2025

Check out the 25 new pieces of training content added in May, alongside the always fresh content update highlights, new features and events.

April 01, 2025 07:00 AM
Top API testing firm APIsec exposed customer data during security lapse

APIsec, a company specializing in proactive, automated, and continuous API security testing, may have inadvertently leaked sensitive customer data online,...

March 31, 2025 07:00 AM
Exclusive: API testing firm APIsec exposed customer data during security lapse

API testing firm APIsec has confirmed it secured an exposed internal database containing customer data, which was connected to the internet for several days...

May 12, 2022 07:00 AM
SLVA Cybersecurity to Provide Crucial New API Security Solutions

SLVA has partnered with APIsec, a specialist API security company dedicated to continuous, automated API security testing, to become a reseller of these...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

APIsec CyberSecurity History Information

Official Website of APIsec

The official website of APIsec is https://apisec.ai.

APIsec’s AI-Generated Cybersecurity Score

According to Rankiteo, APIsec’s AI-generated cybersecurity score is 697, reflecting their Weak security posture.

How many security badges does APIsec’ have ?

According to Rankiteo, APIsec currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does APIsec have SOC 2 Type 1 certification ?

According to Rankiteo, APIsec is not certified under SOC 2 Type 1.

Does APIsec have SOC 2 Type 2 certification ?

According to Rankiteo, APIsec does not hold a SOC 2 Type 2 certification.

Does APIsec comply with GDPR ?

According to Rankiteo, APIsec is not listed as GDPR compliant.

Does APIsec have PCI DSS certification ?

According to Rankiteo, APIsec does not currently maintain PCI DSS compliance.

Does APIsec comply with HIPAA ?

According to Rankiteo, APIsec is not compliant with HIPAA regulations.

Does APIsec have ISO 27001 certification ?

According to Rankiteo,APIsec is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of APIsec

APIsec operates primarily in the IT Services and IT Consulting industry.

Number of Employees at APIsec

APIsec employs approximately 45 people worldwide.

Subsidiaries Owned by APIsec

APIsec presently has no subsidiaries across any sectors.

APIsec’s LinkedIn Followers

APIsec’s official LinkedIn profile has approximately 8,132 followers.

NAICS Classification of APIsec

APIsec is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

APIsec’s Presence on Crunchbase

No, APIsec does not have a profile on Crunchbase.

APIsec’s Presence on LinkedIn

Yes, APIsec maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/apisec.

Cybersecurity Incidents Involving APIsec

As of December 27, 2025, Rankiteo reports that APIsec has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

APIsec has an estimated 38,104 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at APIsec ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does APIsec detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notified affected parties..

Incident Details

Can you provide details on each incident ?

Incident : Data Exposure

Title: APIsec Data Exposure Incident

Description: APIsec, a company specializing in API security testing, exposed sensitive customer data through an unprotected internet-connected database. Upon discovery by UpGuard, it was found that the database contained names, email addresses, and details pertaining to the API security of its clients, including the status of 2FA activation. Initially downplayed by APIsec as 'test data', evidence confirmed real-world customer information was included. The company later notified affected parties although the extent of the breach was not disclosed.

Type: Data Exposure

Attack Vector: Unprotected Database

Vulnerability Exploited: Unsecured Internet-Connected Database

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Exposure API1011040125

Data Compromised: Names, Email addresses, Api security details, 2fa activation status

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Email Addresses, Api Security Details, 2Fa Activation Status and .

Which entities were affected by each incident ?

Incident : Data Exposure API1011040125

Entity Name: APIsec

Entity Type: Company

Industry: API Security Testing

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Exposure API1011040125

Communication Strategy: Notified affected parties

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Exposure API1011040125

Type of Data Compromised: Names, Email addresses, Api security details, 2fa activation status

Sensitivity of Data: High

Personally Identifiable Information: NamesEmail addresses

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified affected parties.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email addresses, API security details, 2FA activation status and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, API security details, Email addresses and 2FA activation status.

cve

Latest Global CVEs (Not Company-Specific)

Description

n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.

Risk Information
cvss3
Base: 7.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Description

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=apisec' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge