Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach ...
CVE-2026-42208 exploited within 36 hours of disclosure, exposing LiteLLM credentials, risking cloud account compromise.
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security ...
Developers are increasingly adopting Microsoft Authentication Library (MSAL) for stronger, more flexible authentication in SharePoint Framework (SPFx) solutions. This enables secure token handling, ...
CVE-2026-34040 lets attackers bypass some Docker authentication plugins by allowing an empty request body. Present since 2024, this bug was caused by a previous fix to the auth workflow. In the ...
Passwords alone are no longer enough to keep accounts safe. Data leaks, phishing attacks, and automated login attempts make even strong passwords vulnerable. Two-factor authentication (2FA) adds an ...
Spotify is changing how its APIs work in Developer Mode, its layer that lets developers test their third-party applications using the audio platform’s APIs. The changes include a mandatory premium ...
Tech Moves covers notable hires, promotions and personnel changes in the Pacific NW tech community. Submissions: [email protected] by Taylor Soper on Feb 3, 2026 at 6:59 pm February 4, 2026 at 8:13 am ...
IBM has released security updates to address a critical IBM API Connect vulnerability that could allow remote attackers to bypass authentication controls and gain unauthorized access to affected ...
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely. API Connect is an application ...
Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications. IBM is urging customers to quickly patch a critical vulnerability in its API ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results