News

In today’s digital era, where interconnectedness and data exchange reign supreme, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication between different ...
Close to 12,000 valid secrets that include API keys and passwords have been found in the Common Crawl dataset used for training multiple artificial intelligence models. Microsoft has introduced an ...
GitHub has announced on Monday that it expanded its code hosting platform's secrets scanning capabilities for GitHub Advanced Security customers to block secret leaks automatically. Secret scanning is ...
Hush Security was created to address these exact problems. Instead of trying to make key management slightly better, it eliminates static keys entirely. Its platform replaces long-lived credentials ...
Microsoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.
The firm’s Imperva business analyzed data from over 4000 environments worldwide to produce its API Threat Report (H1 2025).
Cybersecurity researchers have discovered more than 3,000 mobile apps exposing Twitter Inc. application programming interface keys that can be used to gain access to or take over Twitter accounts.
Yubico, the company behind the increasingly popular YubiKey two-factor authentication key, has raised a $30 million funding round. This marks the first major institutional funding round for Yubico, ...