API Threat Protection: Learning From Real Life Examples