Tag: api
-
Why Every Enterprise Needs a Strong API Security Strategy?
Modern enterprises are rapidly shifting toward API-centric architectures, leveraging APIs to connect internal systems, external partners, and digital services. With 74% of organizations adopting API-first development models, APIs now drive critical business logic and data exchanges at scale. However, this API proliferation also dramatically increases the attack surface, exposing sensitive data and business processes to……
-
Everyone Knows About Broken Authorization So Why Does It Still Work for Attackers?
Broken authorization is one of the most widely known API vulnerabilities. It features in the OWASP Top 10, AppSec conversations, and secure coding guidelines. Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) account for hundreds of API vulnerabilities every quarter. According to the 2026 API ThreatStats report, authorization issues ranked ninth in…
-
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them.On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off:Sign-ups increase, but users aren’t activating.Server costs rise faster than revenue.Logs are filled with repeated requests from strange user…
-
Hackers Launch Massive SonicWall Firewall Attack Using 4,000+ IP Addresses
Hackers are actively mapping SonicWall firewalls worldwide, launching more than 84,000 SonicOS scanning sessions from over 4,000 unique IP addresses in just four days to identify SSL VPN targets for future credential and vulnerability attacks. Three operationally distinct infrastructure clusters coordinated large-scale VPN enumeration, with 92% of all sessions hitting a single SonicOS REST API…
-
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data.The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix “AIza”) embedded in client-side code to provide Google-related services…
-
‘Silent’ Google API key change exposed Gemini AI data
Mitigation: The first job for concerned site admins is to check in the GCP console for keys specifically allowing the Generative Language API. In addition, look for unrestricted keys, now identified by a yellow warning icon. Check if any of these keys are public.Exposed keys should all be rotated or ‘regenerated,’ with a grace period…
-
Public Google API keys can be used to expose Gemini AI data
Researchers found that Google API keys long treated as harmless can now unlock access to Gemini. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/public-google-api-keys-can-be-used-to-expose-gemini-ai-data/
-
Cloudflare experiment ports most of Next.js API ‘in one week’ with AI
Uses Vite and Claude to sidestep Vercel lock-in First seen on theregister.com Jump to article: www.theregister.com/2026/02/25/cloudflare_nextjs_api_ai/
-
Your personal OpenClaw agent may also be taking orders from malicious websites
Tags: access, ai, api, attack, authentication, credentials, identity, malicious, monitoring, radius, software, update, vulnerabilityA larger blast radius: Unlike regular software vulnerabilities, compromised AI agents have a bigger blast radius as they hold sensitive API keys, session tokens, file system access, and the authority to execute tasks across enterprise tools.Barr emphasized that autonomous systems “aggregate identity, credentials, and workflow authority,” meaning a failure doesn’t occur quietly. Instead, the agent…
-
Android 17 second beta expands privacy controls for contacts, SMS and local networks
Google’s second beta of Android 17 continues updates to platform behavior and introduces new APIs focused on protecting sensitive data. Protecting contact and local network … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/27/android-17-beta-privacy-updates/
-
OpenClaw Insights: A CISO’s Guide to Safe Autonomous Agents FireTail Blog
Tags: access, ai, api, breach, ciso, compliance, control, data, data-breach, detection, endpoint, finance, firewall, framework, governance, guide, LLM, network, open-source, risk, risk-management, software, strategy, technology, tool, vulnerabilityFeb 27, 2026 – Alan Fagan – The “OpenClaw” crisis has board members asking, “Could this happen to us?” The answer isn’t to ban AI agents. It’s to govern them. By now, the dust is settling on the OpenClaw (aka MoltBot) incident. The technical post-mortems (including our own) have been written, the exposed ports have…
-
Previously harmless Google API keys now expose Gemini AI data
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/
-
Malicious Repo Files Could Hijack Claude Code Sessions
Flaws Let Attackers Run Commands and Steal API Keys Before Trust Prompt. Check Point research found three critical flaws in Anthropic’s Claude Code that allow attackers to execute arbitrary commands and steal API keys through repository configuration files, before users see a trust prompt. The AI giant has patched all three vulnerabilities. First seen on…
-
OpenClaw Security Risk: OAuth and SaaS Identity
OpenClaw runs locally, but the risk lives in SaaS. Learn how OAuth tokens, API access, and AI agents create identity-based exposure across platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/openclaw-security-risk-oauth-and-saas-identity/
-
Kritische Sicherheitslücken in Anthropics Claude-Code
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat kritische Schwachstellen in Anthropics KI-basiertem Coding-Tool ‘Claude Code” identifiziert (CVE-2025-59536, CVE-2026-21852). Diese ermöglichten die Ausführung von Remote-Code und den Diebstahl von API-Anmeldedaten. Durch den Missbrauch integrierter Mechanismen wie Hooks, Model-Context-Protocol (MCP)-Integrationen und Umgebungsvariablen konnten Angreifer beliebige Shell-Befehle ausführen und API-Schlüssel exfiltrieren, wenn Entwickler…
-
Kritische Sicherheitslücken in Anthropics Claude-Code
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat kritische Schwachstellen in Anthropics KI-basiertem Coding-Tool ‘Claude Code” identifiziert (CVE-2025-59536, CVE-2026-21852). Diese ermöglichten die Ausführung von Remote-Code und den Diebstahl von API-Anmeldedaten. Durch den Missbrauch integrierter Mechanismen wie Hooks, Model-Context-Protocol (MCP)-Integrationen und Umgebungsvariablen konnten Angreifer beliebige Shell-Befehle ausführen und API-Schlüssel exfiltrieren, wenn Entwickler…
-
Kritische Sicherheitslücken in Anthropics Claude-Code
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat kritische Schwachstellen in Anthropics KI-basiertem Coding-Tool ‘Claude Code” identifiziert (CVE-2025-59536, CVE-2026-21852). Diese ermöglichten die Ausführung von Remote-Code und den Diebstahl von API-Anmeldedaten. Durch den Missbrauch integrierter Mechanismen wie Hooks, Model-Context-Protocol (MCP)-Integrationen und Umgebungsvariablen konnten Angreifer beliebige Shell-Befehle ausführen und API-Schlüssel exfiltrieren, wenn Entwickler…
-
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
Tags: access, api, apt, china, cloud, communications, cyber, cyberespionage, data, defense, endpoint, espionage, google, government, group, hacker, infrastructure, intelligence, linux, mandiant, monitoring, network, phone, radius, service, spy, theft, threat, vpnHow Mandiant found it: The campaign came to light during a Mandiant Threat Defense investigation, when analysts flagged unusual activity on a CentOS server. A binary named xapt, designed to masquerade as the apt package manager on Debian-based Linux systems, had already escalated to root and was running shell commands to confirm its access level,…
-
Check Point Research identifiziert kritische Sicherheitslücken in Anthropics Claude Code
Die schwerwiegendste Schwachstelle betrifft die Manipulation der API-Kommunikation. Durch eine gezielte Konfigurationsänderung konnte der gesamte API-Verkehr, inklusive des vollständigen Autorisierungs-Headers mit dem aktiven API-Key des Entwicklers First seen on infopoint-security.de Jump to article: www.infopoint-security.de/check-point-research-identifiziert-kritische-sicherheitsluecken-in-anthropics-claude-code/a43835/
-
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector.The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by a…
-
Keeper Security führt quantenresistente Verschlüsselung ein
Die Bereitstellung der Kyber-basierten quantenresistenten Verschlüsselung ist nun in den Backend-APIs von Keeper und Keeper Commander verfügbar. In Kürze wird sie auch auf mobilen Plattformen verfügbar sein First seen on infopoint-security.de Jump to article: www.infopoint-security.de/keeper-security-fuehrt-quantenresistente-verschluesselung-ein/a43823/
-
Is Your AppSec Program Truly Mature?
Learn how to build a high-maturity Application Security program with secure SDLC, developer-first practices, automated AppSec controls, practical threat modeling, runtime API protection, and meaningful security metrics. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/is-your-appsec-program-truly-mature/
-
Is Your AppSec Program Truly Mature?
Learn how to build a high-maturity Application Security program with secure SDLC, developer-first practices, automated AppSec controls, practical threat modeling, runtime API protection, and meaningful security metrics. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/is-your-appsec-program-truly-mature/
-
Firefox 148 Unveils New Sanitizer API to Mitigate XSS Attacks in Web Applications
Firefox has launched a major update to help protect web applications from Cross-Site Scripting (XSS) attacks. With the release of Firefox 148, Mozilla introduces the new standardized Sanitizer API, making it the first browser to ship this built-in security tool. This new feature gives web developers an easy way to clean up untrusted code before…
-
Untrusted repositories turn Claude code into an attack vector
Flaws in Anthropic’s Claude Code could allow remote code execution and theft of API keys when users open untrusted repositories. Check Point Research team found multiple vulnerabilities in Anthropic’s Claude Code AI coding assistant that could lead to remote code execution and API key theft. The vulnerabilities abuse features such as Hooks, MCP servers, and…

