Hackers rushed to target a critical LiteLLM SQL injection flaw to steal keys, credentials, and environment-variable ...
AI-driven API vulnerabilities have skyrocketed by 1205% in the past year. The figures come from the 2025 API ThreatStats Report by Wallarm, which highlights how AI has become the biggest driver of API ...
A severe vulnerability in the AI-powered development tool Cursor allows installed extensions to access locally stored API keys and session tokens without user action, according to LayerX researchers.
Salt Security added API security posture insights and automated OpenAPI Specification (OAS) analysis and reporting capabilities to its API Protection Platform. The move comes as API security ...
Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data. A recent ...
Imad was a senior reporter covering Google and internet culture. Hailing from Texas, Imad started his journalism career in 2013 and has amassed bylines with The New York Times, The Washington Post, ...
Anthropic sends Claude Security into public beta. It scans code for vulnerabilities, suggests patches, and aims for strict ...
Important security updates close multiple vulnerabilities in the web UI for nginx web servers Nginx UI. Attackers can take ...
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely. API Connect is an application ...
In 2024, we at Dark Reading covered a variety of attacks, exploits, and, of course, vulnerabilities across the board. Here, we recount 10 emerging threats organizations should be prepared for — as ...
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...