The Google API keys, all using the ‘AIza…’ format, can be abused for retroactive privilege escalation: a key that a developer ...
A flaw in Google's API key system has reportedly exposed mobile applications to unintended access to its Gemini AI platform.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
A BrowserGate investigation alleges LinkedIn secretly scans over 6,000 browser extensions and builds device fingerprints ...
A CloudSEK report reveals that 22 Android apps with over 500 million installs expose hardcoded API keys that can access ...
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
In early April 2025, security researchers confirmed that North Korean state-sponsored hackers had successfully compromised the Axios HTTP library. It is one ...
Spread the loveThe digital landscape is continuously evolving, and with it, the necessity for robust cybersecurity measures has never been more critical. Recent findings by CloudSEK’s BeVigil have ...
Visualping, the world’s leading website change detection platform used by teams at 85% of Fortune 500 companies, has ...
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.

Chrome

Chrome extensions were spotted leaking sensitive browser data like API keys, secrets, and tokens via unguarded HTTP ...