News

Hush Security was created to address these exact problems. Instead of trying to make key management slightly better, it eliminates static keys entirely. Its platform replaces long-lived credentials ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More As the attack surface continues to expand across the cloud, API security ...
JumpCloud, a US-based enterprise software firm is notifying several customers of an "ongoing incident." As a caution, the company has invalidated existing admin API keys to protect its customer ...
Sumo Logic, a U.S.-based cloud data analytics and log analysis company, is urging users to reset API keys after discovering a security breach. In a security notice published this week, Sumo Logic ...
That’s a big loophole when it’s easier than ever to impersonate other users unnoticed by obtaining valid static credentials ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
GitHub is now automatically blocking the leak of sensitive information like API keys and access tokens for all public code repositories. Today's announcement comes after the company introduced push ...
An as-of-yet undiagnosed compromise of the Salesloft Drift AI-driven platform has led to a rash of stolen OAuth tokens, in turn creating downstream breaches at some of the biggest names in the ...
Security researchers have discovered over 3200 mobile apps which are leaking Twitter API keys, potentially enabling threat actors to perform account takeovers. Twitter APIs enable developers to access ...
On September 5, 2025, GitGuardian discovered GhostAction, a massive supply chain attack affecting 327 GitHub users across 817 ...
Analysis of 600 apps on the Google Play store by CloudSEK’s BeVigil security search engine found that 50% were leaking application programming interface (API) keys of three popular transactional and ...
Security researchers have uncovered more than 1,500 apps leaking the Algolia application programming interface key and application ID, potentially exposing user data. Discovered by researchers at ...