A severe vulnerability in the AI-powered development tool Cursor allows installed extensions to access locally stored API keys and session tokens without user action, according to LayerX researchers.
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security ...
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by ...
A critical pre-authentication SQL injection vulnerability in BerriAI’s LiteLLM Python package came under active exploitation ...
The CIAM platform that got you to 1 million users won't get you to 10 million AI agents. Legacy authentication built for ...
Hackers rushed to target a critical LiteLLM SQL injection flaw to steal keys, credentials, and environment-variable ...
A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach ...
Legacy IAM can't govern autonomous AI agents that spin up, execute and terminate in seconds. New identity patterns are now emerging. The post Why Traditional IAM Is No Match for Agentic AI appeared ...
BigID is the first and only data security platform to discover, classify, and secure sensitive data inside AI instruction ...
Read Microsoft expert tips for CISOs on embracing strong proactive security to mitigate increased exposure to security ...
Vercel has confirmed a security breach linked to a compromised third-party AI tool, exposing some environment variables and ...