#apisecurity

2026-01-20

Alright team, it's been a busy 24 hours in the cyber world with significant updates on AI-related vulnerabilities, new malware, ongoing cybercrime operations, and shifts in the threat landscape. Let's dive in:

AI-Powered Vulnerabilities and RCE Risks 🛡️

- Anthropic has patched three critical flaws (path validation bypass, unrestricted git_init, argument injection) in its Git Model Context Protocol (MCP) server. When chained with the Filesystem MCP server, these bugs could enable remote code execution (RCE) via indirect prompt injection.
- The open-source AI framework Chainlit (used by financial, energy, and academic sectors) was found to have two "easy-to-exploit" vulnerabilities: an arbitrary file read (CVE-2026-22218) and a server-side request forgery (SSRF) (CVE-2026-22219). These could lead to data leakage, account takeover, and lateral movement in enterprise cloud environments.
- Google Gemini was hit by a prompt injection flaw, weaponising Calendar invites to bypass privacy controls, access private meeting data, and create deceptive events without user interaction. This highlights a "structural limitation" in how AI-integrated products interpret user intent in natural language.

🕵🏼 The Register | go.theregister.com/feed/www.th
🕵🏼 The Register | go.theregister.com/feed/www.th
🕶️ Dark Reading | darkreading.com/cloud-security

New Malware and AI-Assisted Development 🤖

- VoidLink, a sophisticated Linux malware targeting cloud environments (AWS, GCP, Azure, Alibaba, Tencent) with 37 plugins, was "almost entirely generated by artificial intelligence." Researchers believe a single individual, using the Trae Solo AI assistant, developed the functional implant in under a week.
- A regionally focused threat actor, tracked as Nomad Leopard, is targeting Afghan government employees with phishing emails disguised as official correspondence. These emails deliver FalseCub malware, designed for data exfiltration, and leverage GitHub for temporary payload hosting.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/hackers-target

Mass Spam and Illicit Marketplace Shutdowns ⚠️

- Multiple users are reporting a wave of mass spam emails originating from Zendesk domains, leveraging instances belonging to legitimate companies like Live Nation, Capcom, and Tinder. These emails are often bypassing spam filters, with Zendesk investigating potential relay attacks or misconfigurations.
- Tudou Guarantee, a major Telegram-based illicit marketplace that processed over $12 billion in transactions, appears to be winding down its operations. This shutdown is linked to recent law enforcement actions against Cambodian conglomerate Prince Group and its CEO, Chen Zhi, implicated in "pig butchering" scams.

🕶️ Dark Reading | darkreading.com/threat-intelli
📰 The Hacker News | thehackernews.com/2026/01/tudo

Evolving Threat Landscape: AI and Hacktivism 🚨

- Cybercrime has fully embraced AI, with "Dark LLMs" and deepfake tools now available as cheap, off-the-shelf services. Group-IB reports Dark LLMs for scams and malware can be rented for as little as $30/month, and synthetic identity kits for $5, significantly scaling social engineering and fraud.
- The UK's NCSC has warned of a sustained cyber threat from pro-Russian hacktivist groups, such as NoName057(16), continuing to target UK and international organisations with disruptive cyberattacks, including DDoS. These ideologically motivated groups, though less sophisticated than state-sponsored actors, can still cause significant real-world disruption.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/uk-ncsc-warnin

Cybersecurity Legislation and Funding Updates 🏛️

- US lawmakers have once again moved to temporarily extend two key cybersecurity laws: the 2015 Cybersecurity and Information Sharing Act (CISA 2015) and the State and Local Cybersecurity Grant Program, through September 30. This is part of a compromise government funding bill, highlighting ongoing challenges for long-term reauthorization.
- The proposed funding bill also allocates $2.6 billion for the Cybersecurity and Infrastructure Security Agency (CISA), including $39.6 million for election security programs. The legislation also includes directives on CISA staffing levels, aiming to ensure sufficient personnel for its statutory missions.

🗞️ The Record | therecord.media/lawmakers-move
🤫 CyberScoop | cyberscoop.com/congressional-a

Cloudflare WAF Bypass Fixed 🌐

- Cloudflare has patched a security vulnerability in its Automatic Certificate Management Environment (ACME) validation logic. The flaw could have allowed a bypass of Web Application Firewall (WAF) rules, enabling requests to reach origin servers. No evidence of malicious exploitation was found.

📰 The Hacker News | thehackernews.com/2026/01/clou

Predator Bots and API Security 🤖

- The rise of "predator bots" — self-learning programs leveraging AI to mimic human behaviour and exploit APIs — is causing up to $186 billion in annual economic harm through credential theft, scalping, and fraud. Defending against these adaptive threats requires deep API knowledge, complete API discovery, and machine-speed behavioral detection.

🤫 CyberScoop | cyberscoop.com/malicious-bots-

#CyberSecurity #ThreatIntelligence #Vulnerabilities #AI #PromptInjection #RCE #Malware #CloudSecurity #APIsecurity #Hacktivism #Cybercrime #InfoSec #IncidentResponse #ThreatLandscape

Code Labs Academycodelabsacademyupdates
2026-01-20

Building clinical ML APIs? Zero trust helps you prove who accessed a prediction and why.

This guide covers OAuth2/OIDC JWT checks, mTLS for service identity, and privacy‑aware audit logging practical APISecurity for ZeroTrust teams shipping and with .

Read the full guide: codelabsacademy.com/en/blog/ze

2026-01-15

Bluspark’s shipping platform exposed sensitive data via unauthenticated APIs.

• Plaintext passwords
• Admin account creation
• Shipment records back to 2007

technadu.com/bluspark-unauthen

What’s your approach to securing APIs in complex supply chains?

#Infosec #APISecurity #VulnerabilityManagement

Bluspark Unauthenticated API Vulnerability Exposed Sensitive Data, Including Plaintext Passwords

Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site

peertube.eqver.se/w/9U5h9p7r5B

Getting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0

peertube.eqver.se/w/h9PFH3J4wj

Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions

peertube.eqver.se/w/ektPnmJ2cJ

2026-01-03

Eighteen months of monitoring public Postman artefacts indicates reduced credential exposure, but persistent low-volume risk.

2025 findings were mostly single-secret incidents - yet validated and contextualized, making them operationally meaningful.

The issue appears rooted in ownership and lifecycle management of collaboration artefacts, not platform mechanics.

How are teams addressing secret hygiene outside traditional SDLC controls?
Follow TechNadu for practitioner-focused cybersecurity analysis.

#APISecurity #SecretsManagement #RiskSurface #DevSecOps #InfoSec

Secrets in the Wild (2025): What 18 Months of Monitoring Exposed
Victor on Softwaregetvictor@techhub.social
2025-12-29
JAVAPROjavapro
2025-12-29

Broken object-level auth, SSRF, missing rate limits — Java APIs fail in predictable ways. This step-by-step guide by @mezoCode maps each flaw to a working solution.

Essential read for secure backends: javapro.io/2025/11/12/masterin

@owasp

Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: radar.offseq.com/threat/cve-20 #OffSeq #IBM #Infosec #APIsecurity #CVE202513915

Critical threat: CVE-2025-13915: CWE-305 Authentication Bypass by Primary Weakness in IBM API Connect
2025-12-20

Gateway API truyền thống đang lỗi thời khi hacker dùng proxy IP. APIGate mới giải quyết vấn đề này bằng cách theo dõi "danh tính" thay vì IP. Tốc độ <5ms, bảo mật ClickHouse, không lưu trữ PII. Giải pháp cho botnets và cuộc tấn công IP đổi phiên. #APISecurity #TechInnovation #APIGateway #BảoMậtCôngNghệ #TechNews

reddit.com/r/SaaS/comments/1pr

Outpost24Outpost24
2025-12-19

No malware, no exploits.

The data breach shows how dangerous trusted access has become. Attackers abused valid API credentials from a compromised integration partner, extracted millions of records, and moved straight to underground resale.

Our TI team analyzes how the breach unfolded, the underground activity observed, and the security lessons that matter most.
🔵 Read here: outpost24.com/blog/700credit-d

Victor on Softwaregetvictor@techhub.social
2025-12-09

HTTP Message Signatures (RFC 9421) are becoming a real standard. They solve problems that API keys, JWTs, and mTLS alone cannot.
Full guide: victoronsoftware.com/posts/htt
#APIsecurity #WebSecurity #MessageSignatures #SoftwareEngineering

2025-12-02

Do you need a cloud #SIEM? ☁️ 🤔 As #security for your org matures, a cloud SEIM can give you the ability to analyze and correlate more data for better insights. The benefits of a cloud SIEM include:
☑️ Flexibility
☑️ Scalability
☑️ Cost-effectiveness
☑️ Integrations
☑️ Automation

Learn about the different cloud SIEM deployment models, best practices for getting started with a cloud SIEM, and more — in our latest blog!

graylog.org/post/why-a-cloud-s #CyberSecurity #APISecurity

2025-11-27

OpenAI confirmed that limited API-user data was exposed through a breach at its previous analytics provider, Mixpanel. The dataset included names, emails, coarse location, user/organization IDs, and technical metadata — but no chats, passwords, API keys, or payment data.

Researchers noted that sending identifiable data to analytics tools isn’t aligned with typical security best practices.

What’s your view on data minimization in analytics pipelines?

Source: cybernews.com/security/openai-

Share your thoughts - and follow us for more updates.

#InfoSec #CyberSecurity #DataPrivacy #OpenAI #Mixpanel #APISecurity #DataBreach #VendorSecurity #ThreatIntel #SecurityEngineering #TechNews

OpenAI reveals analytics data breach, notifies affected users
Oliver Zehentleitneroliverzehentleitner@me.dm
2025-11-26

Binance API - IP Whitelisting ≠ userData protection

A ListenKey from a whitelisted IP can be consumed from a different, non-whitelisted host - no secret required.

📺 5-min uncut proof: youtu.be/y9dGtHLEBp8

#infosec #cybersecurity #apiSecurity #responsibledisclosure #binance

Brian Greenberg :verified:brian_greenberg@infosec.exchange
2025-11-25

APIs don’t usually break in spectacular, cinematic ways. They break in the dull corners where “make it easy for users” quietly beats “make it hard for attackers.” WhatsApp’s contact discovery API is a perfect example: a feature designed to help you find friends could be stretched to map billions of users. If someone can ask your system the same harmless question millions of times an hour, the question isn’t harmless anymore.

In this case, researchers showed that with a few authenticated sessions and a single university server, they could probe over 100 million phone numbers per hour and confirm roughly 3.5 billion active WhatsApp accounts. From there, they chained additional endpoints to fetch profile photos, public bios, and device info—no zero-days, no wizardry — just missing rate limits and weak abuse detection. The uncomfortable part is that this isn’t an outlier; it’s a pattern that keeps reappearing on platforms that were never meant to expose anything sensitive at all.

TL;DR
🧠 Contact discovery APIs let researchers map 3.5B active WhatsApp accounts from a massive pool of phone numbers.
⚡ A few sessions on one server pushed tens of millions of checks per hour without being throttled or blocked.
🎓 Public metadata like photos and about text turns a phone number into a rich target for phishing and impersonation.
🔍 Treat every lookup endpoint as part of your threat model and bake in rate limits, anomaly detection, and abuse-resistant design from day one.

bleepingcomputer.com/news/secu

#APISecurity #CyberSecurity #DataProtection #PrivacyTech #security #privacy #cloud #infosec

2025-11-24

A WhatsApp API flaw let researchers scrape 3.5B account records — even small design gaps can create massive exposure. Scale cuts both ways. 📱⚠️ #APISecurity #Breach

bleepingcomputer.com/news/secu

2025-11-23

Bảo mật API là điều không thể thương lượng: Cách bảo vệ ứng dụng SaaS của bạn vào năm 2025
Lưu ý: Xác thực, quản lý khóa API, HTTPS, xác thực đầu vào, bảo vệ dữ liệu, giám sát và cảnh báo
#BảoMậtAPI #SaaS #AnNinhMạng #CyberSecurity #APIsecurity #SaaSSecurity

reddit.com/r/SaaS/comments/1p4

2025-11-21

SonicWall acts after backup breach as state actors target cloud files

SonicWall has concluded an investigation into a security incident involving the unauthorised access of backup firewall configuration files…
#NewsBeep #News #Headlines #APISecurity #ChiefInformationOfficer(CIO) #DisasterRecovery(DR) #Firewalls #Latvia #LV #Mandiant #NetworkSecurity #Ransomware #SecurebyDesign #SecurityOperations #SonicWALL #Threatactors
newsbeep.com/262939/

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst