Authorization vulnerabilities are the most common critical finding in our API penetration tests. We find them on nearly every ...
Device code phishing targets 340+ Microsoft 365 orgs since Feb 2026 via OAuth abuse, enabling persistent token hijacking and ...
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
Attack surface management company Intruder Solutions Ltd. today announced the launch of AutoSwagger, a free, open-source tool that scans OpenAPI-documented application programming interfaces for ...
For years, a lot of risky APIs survived simply because they were hard to find. They weren’t documented. Only a handful of ...
Application programming interfaces (APIs) are integral to the functionality of the internet today. By enabling communications between programs, they make many processes more efficient and convenient, ...
GitHub shared the timeline of breaches in April 2022, this timeline encompasses the information related to when a threat actor gained access and stole private repositories belonging to dozens of ...