Tag: api
-
LAMEHUG: An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration
A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather than relying on static scripts or prewritten payloads, LAMEHUG dynamically queries a Qwen 2.5-Coder-32B-Instruct model via the Hugging Face API to generate Windows command-shell instructions tailored to its current environment. This capability enables on-the-fly reconnaissance,…
-
Mit ShadowV2 wird DDoS zu einem Cloud-nativen Abo-Dienst
DDos-Attacken sind mittlerweile als Auftragsmodell verfügbar, wie eine aktuelle Analyse zeigt.Laut einer Darktrace-Analyse nutzt eine ShadowV2-Bot-Kampagne falsch konfigurierte Docker-Container auf AWS und rüstet sie für DDoS-as-a-Service-Angriffe auf.Was ShadowV2 dabei besonders macht, ist die professionelle Ausstattung mit APIs, Dashboards, Betreiber-Logins und sogar animierten Benutzeroberflächen. ‘Dies ist eine weitere Erinnerung daran, dass Cyberkriminalität kein Nebenjob mehr ist,…
-
Vulnerability in Salesforce AI could be tricked into leaking CRM data
Tags: access, ai, api, attack, cybersecurity, data, exploit, injection, Internet, software, supply-chain, tool, update, vulnerabilityGuardrails, not just patches: While Salesforce responded quickly with a patch, experts agree that AI agents represent a fundamentally broader attack surface. These systems combine memory, decision-making, and tool execution, meaning compromises can spread quickly and, as Bennett puts it, “at machine speed.” “It’s advisable to secure the systems around the AI agents in use, which…
-
APIs werden zunehmend zum Hauptziel für Cyberkriminelle
Das Threat Research Team von Thales verwendete Verhaltensanalysen, maschinelles Lernen und forensische Analysen, um Angriffe zu kategorisieren, sie den Zielendpunkten zuzuordnen und Trends in verschiedenen Branchen zu identifizieren. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/apis-werden-zunehmend-zum-hauptziel-fuer-cyberkriminelle/a42117/
-
AI coding assistants amplify deeper cybersecurity risks
Tags: access, ai, api, application-security, attack, authentication, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, data-breach, detection, fintech, flaw, governance, injection, leak, LLM, metric, open-source, programming, radius, risk, risk-management, service, software, startup, strategy, threat, tool, training, vulnerability‘Shadow’ engineers and vibe coding compound risks: Ashwin Mithra, global head of information security at continuous software development firm Cloudbees, notes that part of the problem is that non-technical teams are using AI to build apps, scripts, and dashboards.”These shadow engineers don’t realize they’re part of the software development life cycle, and often bypass critical…
-
APIs and hardware are under attack, and the numbers don’t look good
Attackers have a new favorite playground, and it’s not where many security teams are looking. According to fresh data from Bugcrowd, vulnerabilities in hardware and APIs are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/24/api-hardware-vulnerabilities-attack/
-
ShadowV2 turns DDoS into a cloud-native subscription service
From botnet to business platform: ShadowV2 is not just malware, it is a marketplace. Darktrace uncovered a full operator interface built with Tailwind and FastAPI, complete with Swagger documentation, admin and user privilege tiers, blacklists, and modular attack options. The design mirrors legitimate SaaS platforms, featuring dashboards and animations that make DDoS as easy as…
-
Critical Security Flaws Grow with AI Use, New Report Shows
Rising hardware, API, and network flaws expose organizations to new risks in an AI-driven landscape First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-security-flaws-grow-ai-use/
-
KuppingerCole 2025: Why Thales is a Market Leader in API Security
APIs are the backbone of modern applications connecting critical microservices and enabling enterprises to turn data into context-aware business logic via AI across their digital services. As applications become more contextual, APIs expose the data, workflows, and model interactions attackers target, making them the enterprise’s primary attack surface. KuppingerCole’s Leadership Compass: API Security & Management……
-
KuppingerCole 2025: Why Thales is a Market Leader in API Security
APIs are the backbone of modern applications connecting critical microservices and enabling enterprises to turn data into context-aware business logic via AI across their digital services. As applications become more contextual, APIs expose the data, workflows, and model interactions attackers target, making them the enterprise’s primary attack surface. KuppingerCole’s Leadership Compass: API Security & Management……
-
How to Gain Control of AI Agents and Non-Human Identities
We hear this a lot:”We’ve got hundreds of service accounts and AI agents running in the background. We didn’t create most of them. We don’t know who owns them. How are we supposed to secure them?”Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API…
-
Researchers expose MalTerminal, an LLM-enabled malware pioneer
SentinelOne uncovered MalTerminal, the earliest known malware with built-in LLM capabilities, and presented it at LABScon 2025. SentinelLABS researchers discovered MalTerminal, the earliest known LLM-enabled malware, which generates malicious logic at runtime, making the detection more complex. Researchers identified it via API key patterns and prompt structures, uncovering new samples and other offensive LLM uses,…
-
MalTerminal: New GPTPowered Malware That Writes Its Own Ransomware
A groundbreaking discovery in cybersecurity research has revealed the emergence of’MalTerminal’, potentially the earliest known example of Large Language Model (LLM)-enabled malware that leverages OpenAI’s GPT-4 API to dynamically generate ransomware code and reverse shells at runtime. This discovery represents a significant evolution in malware sophistication, presenting unprecedented challenges for traditional detection methods. SentinelLABS researchers…
-
Agentic AI der neue Horror für Sicherheitsentscheider?
Tags: ai, antivirus, api, breach, ciso, compliance, cyberattack, cybersecurity, cyersecurity, detection, governance, law, mail, malware, monitoring, risk, service, supply-chain, tool, vulnerabilityKI ist mittlerweile in den meisten Unternehmen gesetzt. Im Trend liegen aktuell vor allem Systeme mit autonomen Fähigkeiten bei denen die potenziellen Sicherheitsrisiken besonders ausgeprägt sind.KI-Agenten werden im Unternehmensumfeld immer beliebter und zunehmend in Workflows und Prozesse integriert. Etwa in den Bereichen Softwareentwicklung, Kundenservice und -Support, Prozessautomatisierung oder Employee Experience. Für CISOs und ihre Teams…
-
Why Human IAM Strategies Fail for Machines
5 min readThe core problem is that human IAM was never built for machine scale or behavior… The amount of non-human identities continues growing”, 10 to 1 will turn into 45 to 1, then 100 to 1, then 200 to 1. Nothing stops this growth. Unlike people, machines can’t use MFA or log in with…
-
Top 10 Best API Security Testing Companies in 2025
In today’s rapidly evolving digital landscape, APIs (Application Programming Interfaces) have become the backbone of online business, connecting services, and enabling new customer experiences. However, as the API footprint grows, so does the attack surface making robust API security testing a critical pillar of enterprise cyber defense in 2025. Whether you’re a security analyst, DevSecOps…
-
Top 10 Best API Security Testing Companies in 2025
In today’s rapidly evolving digital landscape, APIs (Application Programming Interfaces) have become the backbone of online business, connecting services, and enabling new customer experiences. However, as the API footprint grows, so does the attack surface making robust API security testing a critical pillar of enterprise cyber defense in 2025. Whether you’re a security analyst, DevSecOps…
-
Top 10 Best API Security Testing Companies in 2025
In today’s rapidly evolving digital landscape, APIs (Application Programming Interfaces) have become the backbone of online business, connecting services, and enabling new customer experiences. However, as the API footprint grows, so does the attack surface making robust API security testing a critical pillar of enterprise cyber defense in 2025. Whether you’re a security analyst, DevSecOps…
-
Entra ID vulnerability exposes gaps in cloud identity trust models, experts warn
Tags: advisory, api, cloud, cve, exploit, flaw, identity, microsoft, mitigation, risk, service, technology, update, vulnerabilityPatching is done, yet the risk lingers: While CVE-2025-55241 initially carried a maximum base severity score of 10.0 out of 10, Microsoft later revised its advisory on September 4 to rate the flaw at 8.7, reflecting its own exploitability assessment.Microsoft rolled out a fix globally within days of the initial report, adding that its internal…
-
Nokia CBIS/NCS Manager API Vulnerability Allows Attackers to Bypass Authentication
On September 18, 2025, Orange Cert publicly disclosed a critical authentication bypass vulnerability affecting Nokia’s CBIS (CloudBand Infrastructure Software) and NCS (Nokia Container Service) Manager API (CVE-2023-49564). With a CVSS 3.1 score of 9.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), the vulnerability poses a severe risk to organizations relying on these management platforms to orchestrate and secure their containerized network…
-
Cloudflare Confirms API Outage Caused by React useEffect Overload Issue
Cloudflare experienced a significant outage on September 12, 2025, affecting its Tenant Service API, multiple APIs, and the Cloudflare Dashboard. The company has confirmed that the incident was primarily triggered by a React programming bug that caused excessive API calls, overwhelming critical infrastructure components. Technical Root Cause Identified The outage originated from a coding error…
-
Cloudflare Confirms API Outage Caused by React useEffect Overload Issue
Cloudflare experienced a significant outage on September 12, 2025, affecting its Tenant Service API, multiple APIs, and the Cloudflare Dashboard. The company has confirmed that the incident was primarily triggered by a React programming bug that caused excessive API calls, overwhelming critical infrastructure components. Technical Root Cause Identified The outage originated from a coding error…
-
Cloudflare DDoSed itself with React useEffect hook blunder
Tags: apiDashboard loop caused API outage that was hard to troubleshoot First seen on theregister.com Jump to article: www.theregister.com/2025/09/18/cloudflare_ddosed_itself/
-
Cloudflare DDoSed itself with React useEffect hook blunder
Tags: apiDashboard loop caused API outage that was hard to troubleshoot First seen on theregister.com Jump to article: www.theregister.com/2025/09/18/cloudflare_ddosed_itself/
-
1 in 3 Android Apps Leak Sensitive Data
One third of Android and over half iOS apps shown to be leaking insecure APIs and hardcoded secrets First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/android-apps-leak-sensitive-data/
-
Salt Security Announces Industry First Solution to Secure API Actions Taken by AI Agents
At CrowdStrike Fal.Con 2025, Salt Security announced the industry’s first solution to secure the actions AI agents take in the enterprise. As large organisations adopt agentic AI, agents are increasingly making real-time API calls through protocols like MCP and A2A, creating a new layer of risk. Salt is the first to converge API and AI…
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
API-Sicherheit im KI-Zeitalter – Warum APIs zum größten Risiko und Schlüssel für Innovation werden
First seen on security-insider.de Jump to article: www.security-insider.de/api-security-ki-risiken-strategien-a-0268a20cdfa03a7a2c3b017c3a02fc91/
-
Malicious PyPI Packages Deliver SilentSync RAT
IntroductionZscaler ThreatLabz regularly monitors for threats in the popular Python Package Index (PyPI), which contains open source libraries that are frequently used by many Python developers. In July 2025, a malicious Python package named termncolor was identified by ThreatLabz. Just a few weeks later, on August 4, 2025, ThreatLabz uncovered two more malicious Python packages…

