Vulnerable endpoints are induced to make unauthorized requests to internal resources or external systems.
API security risks and mitigation: Essential strategies ... - Tyk.io Protecting APIs From Advanced Security Risks – AZMATH
The proliferation of unmanaged or undocumented APIs creates an unmonitored attack surface for cybercriminals. Protecting APIs From Advanced Security Risks – AZMATH