Tag: api
-
Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations
by
in SecurityNewsAgentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/unified-intelligence-vs-agent-sprawl-rethinking-ai-powered-security-operations/
-
Decrypting the Forest From the Trees
by
in SecurityNews
Tags: api, computer, container, control, credentials, data, endpoint, least-privilege, microsoft, network, password, powershell, service, updateTL;DR: SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via the Administration Service API. Introduction While Duane Michael, Chris Thompson, and I were originally working on the Misconfiguration Manager project, one of the tasks I took…
-
NHS investigating how API flaw exposed patient data
by
in SecurityNewsNHS patient data was left vulnerable by a flaw in an application programming interface used at online healthcare provider Medefer First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620174/NHS-investigating-how-API-flaw-exposed-patient-data
-
Role of AutoSecT in API Pentesting
by
in SecurityNewsAPIs (Application Programming Interfaces) have become the backbone of modern software, enabling seamless communication between applications and services with efficiency and simplicity. As APIs play an increasingly vital role in today’s digital ecosystem, ensuring their security is more critical than ever. A key aspect of the Software Development Life Cycle (SDLC) is API Pentesting. This……
-
Plugging the holes in open banking
by
in SecurityNewsEnhancing API security for financial institutions First seen on theregister.com Jump to article: www.theregister.com/2025/03/04/plugging_the_holes_in_open/
-
LLMjacking Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs
by
in SecurityNewsIn a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in a new attack vector dubbed >>LLMjacking.
-
Konsolidierung kann helfen – Komplexität bei Webanwendungen und APIs sind alarmierend
by
in SecurityNews
Tags: apiFirst seen on security-insider.de Jump to article: www.security-insider.de/cybersicherheit-herausforderungen-loesungen-zunehmende-api-nutzung-a-4a0ef417c68fd59bed5a767b71d5b045/
-
KI-Trainingsdaten: Tausende gültiger API-Keys in gecrawlten Webdaten entdeckt
by
in SecurityNewsBei der Analyse eines frei verfügbaren Archivs mit rund 400 TBytes an Websitedaten haben Forscher fast 12.000 gültige API-Keys und Passwörter gefunden. First seen on golem.de Jump to article: www.golem.de/news/ki-trainingsdaten-tausende-gueltiger-api-keys-in-gecrawlten-webdaten-entdeckt-2503-193908.html
-
SIEM-Kaufratgeber
by
in SecurityNews
Tags: access, ai, api, business, cloud, compliance, container, cyberattack, data, detection, DSGVO, encryption, framework, HIPAA, infrastructure, least-privilege, mail, microsoft, mitre, ml, monitoring, open-source, saas, service, siem, skills, soar, software, threat, toolDie kontextuellen Daten, die SIEM-Lösungen liefern, sind eine grundlegende Komponente moderner Security-Stacks.Protokoll-Daten zu auditieren, zu überprüfen und zu managen, ist alles andere als eine glamouröse Aufgabe aber ein entscheidender Aspekt, um ein sicheres Unternehmensnetzwerk aufzubauen. Schließlich schaffen Event Logs oft eine sekundäre Angriffsfläche für Cyberkriminelle, die damit ihre Aktivitäten verschleiern wollen.Vorgängen wie diesen treten Netzwerksicherheitsexperten…
-
Forscher entdecken LLM-Sicherheitsrisiko
Forscher haben Anmeldeinformationen in den Trainingsdaten von Large Language Models entdeckt.Beliebte LLMs wie DeepSeek werden mit Common Crawl trainiert, einem riesigen Datensatz mit Website-Informationen. Forscher von Truffle Security haben kürzlich einen Datensatz des Webarchives analysiert, der über 250 Milliarden Seiten umfasst und Daten von 47,5 Millionen Hosts enthält. Dabei stellten sie fest, dass rund 12.000…
-
Nearly 12,000 API keys and passwords found in AI training dataset
by
in SecurityNewsClose to 12,000 valid secrets that include API keys and passwords have been found in the Common Crawl dataset used for training multiple artificial intelligence models. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nearly-12-000-api-keys-and-passwords-found-in-ai-training-dataset/
-
New Malware Campaign Exploits Microsoft Graph API to Infect Windows
FortiGuard Labs discovers an advanced attack using modified Havoc Demon and SharePoint. Explore the attack’s evasion techniques and security measures. First seen on hackread.com Jump to article: hackread.com/malware-exploits-microsoft-graph-api-infect-windows/
-
Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites
by
in SecurityNews
Tags: api, communications, control, cybersecurity, framework, hacker, malware, microsoft, open-source, phishing, powershell, threatCybersecurity researchers are calling attention to a new phishing campaign that employs the ClickFix technique to deliver an open-source command-and-control (C2) framework called Havoc.”The threat actor hides each malware stage behind a SharePoint site and uses a modified version of Havoc Demon in conjunction with the Microsoft Graph API to obscure C2 communications within trusted,…
-
Phishing Campaign Uses Havoc Framework to Control Infected Systems
A new phishing campaign has been identified using Havoc to control infected systems, leveraging SharePoint and Microsoft Graph API First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-campaign-havoc-framework/
-
12K hardcoded API keys and passwords found in public LLM training data
First seen on scworld.com Jump to article: www.scworld.com/news/12k-hardcoded-api-keys-and-passwords-found-in-public-llm-training-data
-
Almost All Organisations Experienced API Security Issues in Past Year
by
in SecurityNewsThe latest State of API Security Report by Salt Security has highlighted the ongoing challenges faced by organisations in securing their application programming interfaces (APIs). The Salt Labs State of API Security Report Q1 2025 draws on survey responses from over 200 IT and security professionals, alongside anonymised data from Salt Security’s customer base, to…
-
Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation
by
in SecurityNewsMicrosoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful… First seen on hackread.com Jump to article: hackread.com/microsoft-storm-2139-llmjacking-azure-ai-exploitation/
-
Microsoft targets AI deepfake cybercrime network in lawsuit
by
in SecurityNewsMicrosoft alleges that defendants used stolen Azure OpenAI API keys and special software to bypass content guardrails and generate illicit AI deepfakes for payment. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366619781/Microsoft-targets-AI-deepfake-cybercrime-network-in-lawsuit
-
API Armor: How Bybit’s Real-Time Blacklisting Is Thwarting a $1.5B Crypto Heist
by
in SecurityNewsAPIs present a security risk”, that much is a given. Attacks on APIs have caused some of the most significant security incidents of the past decades. But the question now is: How can we flip the script and leverage their power to enhance security? Bybit might just have the answer. Bybit”, one of the world’s…
-
Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards
by
in SecurityNewsLLMjacking can cost organizations a lot of money: LLMjacking is a continuation of the cybercriminal practice of abusing stolen cloud account credentials for various illegal operations, such as cryptojacking, abusing hacked cloud computing resources to mine cryptocurrency. The difference is that large quantities of API calls to LLMs can quickly rack up huge costs, with…
-
How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales
by
in SecurityNewsIn the fast-paced world of online retail, where customer satisfaction and availability are paramount, a sudden attack by scalping bots can disrupt operations, inflate costs, and damage reputation. A North American Online Retailer faced a month-long bot attack that targeted their inventory system, exploiting vulnerabilities and causing financial losses. Here’s how they fought back and……
-
12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
by
in SecurityNewsA dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication.The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices to…
-
DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
by
in SecurityNewsA sweeping analysis of the Common Crawl dataset”, a cornerstone of training data for large language models (LLMs) like DeepSeek”, has uncovered 11,908 live API keys, passwords, and credentials embedded in publicly accessible web pages. The leaked secrets, which authenticate successfully with services ranging from AWS to Slack and Mailchimp, highlight systemic risks in AI…
-
Empowering SOC Teams with Open and Seamless API Integration
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/native/empowering-soc-teams-with-open-and-seamless-api-integration
-
Integration with Gloo Gateway – Impart Security
by
in SecurityNewsSecuring Web apps, APIs, & LLMs Just Got Easier: Impart’s Native Integration with Gloo Gateway APIs are the backbone of modern applications, but they’re also one of the biggest attack surfaces. As API threats evolve and Large Language Model (LLM) security becomes a pressing concern, organizations need fast, efficient, and easy-to-deploy solutions to protect their…
-
Erweiterte ESicherheit: Retarus integriert API-gestützten Schutz für Microsoft 365 und Co.
by
in SecurityNewsDer E-Mail-Security-Experte Retarus erweitert sein Schutzportfolio um eine API-basierte Bereitstellungsoption, die eine nahtlose Absicherung cloudbasierter E-Mail-Plattformen wie Microsoft 365 ermöglicht. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/erweiterte-e-mail-sicherheit-retarus-integriert-api-gestuetzten-schutz-fuer-microsoft-365-und-co/a39923/
-
What is SIEM? Improving security posture through event log data
by
in SecurityNews
Tags: access, ai, api, automation, ciso, cloud, compliance, data, defense, detection, edr, endpoint, firewall, fortinet, gartner, google, guide, ibm, infrastructure, intelligence, kubernetes, LLM, microsoft, mitigation, mobile, monitoring, network, openai, regulation, risk, router, security-incident, service, siem, soar, soc, software, threat, toolAt its core, a SIEM is designed to parse and analyze various log files, including firewalls, servers, routers and so forth. This means that SIEMs can become the central “nerve center” of a security operations center, driving other monitoring functions to resolve the various daily alerts.Added to this data are various threat intelligence feeds that…