News

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More As the attack surface continues to expand across the cloud, API security ...
The exponential growth of APIs has expanded the digital landscape, enticing attackers to exploit vulnerabilities, gaining unauthorized access to confidential information or disrupting critical ...
On September 5, 2025, GitGuardian discovered GhostAction, a massive supply chain attack affecting 327 GitHub users across 817 ...
Sumo Logic, a U.S.-based cloud data analytics and log analysis company, is urging users to reset API keys after discovering a security breach. In a security notice published this week, Sumo Logic ...
Hush Security was created to address these exact problems. Instead of trying to make key management slightly better, it eliminates static keys entirely. Its platform replaces long-lived credentials ...
GitHub is now automatically blocking the leak of sensitive information like API keys and access tokens for all public code repositories. Today's announcement comes after the company introduced push ...
An as-of-yet undiagnosed compromise of the Salesloft Drift AI-driven platform has led to a rash of stolen OAuth tokens, in turn creating downstream breaches at some of the biggest names in the ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
JumpCloud, a US-based enterprise software firm is notifying several customers of an "ongoing incident." As a caution, the company has invalidated existing admin API keys to protect its customer ...
Security researchers have discovered over 3200 mobile apps which are leaking Twitter API keys, potentially enabling threat actors to perform account takeovers. Twitter APIs enable developers to access ...
Analysis of 600 apps on the Google Play store by CloudSEK’s BeVigil security search engine found that 50% were leaking application programming interface (API) keys of three popular transactional and ...