Hackers rushed to target a critical LiteLLM SQL injection flaw to steal keys, credentials, and environment-variable ...
A severe vulnerability in the AI-powered development tool Cursor allows installed extensions to access locally stored API keys and session tokens without user action, according to LayerX researchers.
Lovable's API exposed source code and database credentials for 48 days after the company closed a bug report. Up to 62% of AI ...
AI-driven API vulnerabilities have skyrocketed by 1205% in the past year. The figures come from the 2025 API ThreatStats Report by Wallarm, which highlights how AI has become the biggest driver of API ...
Salt Security added API security posture insights and automated OpenAPI Specification (OAS) analysis and reporting capabilities to its API Protection Platform. The move comes as API security ...
Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data. A recent ...
Important security updates close multiple vulnerabilities in the web UI for nginx web servers Nginx UI. Attackers can take ...
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely. API Connect is an application ...
Anthropic sends Claude Security into public beta. It scans code for vulnerabilities, suggests patches, and aims for strict ...
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results