Company Details
apisec
45
8,132
5415
apisec.ai
0
API_1345066
In-progress

APIsec Company CyberSecurity Posture
apisec.aiThe APIsec security testing platform discovers the most serious API vulnerabilities that lead to data theft and compromise. APIsec automatically creates and runs thousands of attack playbooks, custom-generated for each unique API, to find security vulnerabilities and data logic flaws BEFORE production. The zero-touch deployment model requires no source code access, no agents, and nothing inline. APIsec runs at the speed of DevOps, alerting security teams and developers immediately of new vulnerabilities in the CI/CD pipeline, ensuring all API code is continuously validated.
Company Details
apisec
45
8,132
5415
apisec.ai
0
API_1345066
In-progress
Between 650 and 699

APIsec Global Score (TPRM)XXXX

Description: APIsec, a company specializing in API security testing, exposed sensitive customer data through an unprotected internet-connected database. Upon discovery by UpGuard, it was found that the database contained names, email addresses, and details pertaining to the API security of its clients, including the status of 2FA activation. Initially downplayed by APIsec as 'test data', evidence confirmed real-world customer information was included. The company later notified affected parties although the extent of the breach was not disclosed.


APIsec has 33.33% more incidents than the average of same-industry companies with at least one recorded incident.
APIsec has 26.58% more incidents than the average of all companies with at least one recorded incident.
APIsec reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
APIsec cyber incidents detection timeline including parent company and subsidiaries

The APIsec security testing platform discovers the most serious API vulnerabilities that lead to data theft and compromise. APIsec automatically creates and runs thousands of attack playbooks, custom-generated for each unique API, to find security vulnerabilities and data logic flaws BEFORE production. The zero-touch deployment model requires no source code access, no agents, and nothing inline. APIsec runs at the speed of DevOps, alerting security teams and developers immediately of new vulnerabilities in the CI/CD pipeline, ensuring all API code is continuously validated.


Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

IGT Solutions is a next-gen customer experience (CX) company, defining and delivering AI-led transformative experiences for the global and most innovative brands using digital technologies. With the combination of Digital and Human Intelligence, IGT becomes the preferred partner for managing end-to-
We are an AI-led, platform-driven Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry expertise to help our clients anticipate what’s next. Our offerings and proven solutions create a unique competitive advantage for our clients by giving them th
Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by buildi

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation s

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a
Infosys is a global leader in next-generation digital services and consulting. We enable clients in more than 50 countries to navigate their digital transformation. With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w
.png)
At 18 years old, cybersecurity researcher Bandana Kaur sits squarely in the middle of Generation Z, the 13- to 28-year-olds who have — or...
Best API Security Testing Tools : 1. Salt Security 2. Traceable 3. Imperva 4. APIsec 5. StackHawk 6. Akto.io 7. F5 8. Cequence Security.
We're excited to announce the addition of six new training modules from APIsec University, now available at the Diamond level in KnowBe4's...
Check out the 25 new pieces of training content added in May, alongside the always fresh content update highlights, new features and events.
APIsec, a company specializing in proactive, automated, and continuous API security testing, may have inadvertently leaked sensitive customer data online,...
API testing firm APIsec has confirmed it secured an exposed internal database containing customer data, which was connected to the internet for several days...
SLVA has partnered with APIsec, a specialist API security company dedicated to continuous, automated API security testing, to become a reseller of these...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of APIsec is https://apisec.ai.
According to Rankiteo, APIsec’s AI-generated cybersecurity score is 697, reflecting their Weak security posture.
According to Rankiteo, APIsec currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, APIsec is not certified under SOC 2 Type 1.
According to Rankiteo, APIsec does not hold a SOC 2 Type 2 certification.
According to Rankiteo, APIsec is not listed as GDPR compliant.
According to Rankiteo, APIsec does not currently maintain PCI DSS compliance.
According to Rankiteo, APIsec is not compliant with HIPAA regulations.
According to Rankiteo,APIsec is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
APIsec operates primarily in the IT Services and IT Consulting industry.
APIsec employs approximately 45 people worldwide.
APIsec presently has no subsidiaries across any sectors.
APIsec’s official LinkedIn profile has approximately 8,132 followers.
APIsec is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, APIsec does not have a profile on Crunchbase.
Yes, APIsec maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/apisec.
As of December 27, 2025, Rankiteo reports that APIsec has experienced 1 cybersecurity incidents.
APIsec has an estimated 38,104 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notified affected parties..
Title: APIsec Data Exposure Incident
Description: APIsec, a company specializing in API security testing, exposed sensitive customer data through an unprotected internet-connected database. Upon discovery by UpGuard, it was found that the database contained names, email addresses, and details pertaining to the API security of its clients, including the status of 2FA activation. Initially downplayed by APIsec as 'test data', evidence confirmed real-world customer information was included. The company later notified affected parties although the extent of the breach was not disclosed.
Type: Data Exposure
Attack Vector: Unprotected Database
Vulnerability Exploited: Unsecured Internet-Connected Database
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Email addresses, Api security details, 2fa activation status
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Email Addresses, Api Security Details, 2Fa Activation Status and .

Entity Name: APIsec
Entity Type: Company
Industry: API Security Testing

Communication Strategy: Notified affected parties

Type of Data Compromised: Names, Email addresses, Api security details, 2fa activation status
Sensitivity of Data: High
Personally Identifiable Information: NamesEmail addresses
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified affected parties.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email addresses, API security details, 2FA activation status and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, API security details, Email addresses and 2FA activation status.
.png)
n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.
LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1.
n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.
Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.