Click any tag below to further narrow down your results
Links
Over 10,000 Docker images on Docker Hub are leaking sensitive credentials, including API keys and cloud access tokens, according to security firm Flare. Many of these leaks originate from unmonitored developer accounts, putting critical infrastructure at risk. Even when developers remove secrets, the underlying credentials often remain active, leaving systems vulnerable.
This article explains how to protect API credentials in MCP server configurations by using 1Password. It details a method to reference secrets from a 1Password vault instead of hardcoding them in plaintext files, reducing the risk of credential exposure.
This article discusses the importance of sandboxing and using proxies to protect sensitive data when working with Claude Code. It highlights potential risks, such as API key exposure, and offers practical solutions for managing access and ensuring confidentiality.
Attackers exploited vulnerabilities in SolarWinds Web Help Desk to steal high-privilege credentials from various organizations. Microsoft is investigating which specific flaws were used, as multiple recent and old CVEs are in play. Security teams are advised to apply patches and monitor for unauthorized remote management tools.
ZeroCrumb is a tool that bypasses Chrome's Elevation Service to extract app-bound credentials and cookies. It uses Transacted Hollowing to impersonate a Chrome instance and decrypt keys, allowing access to sensitive data. Users can implement it as a library and customize it for other credential types.
This article discusses the risks associated with using static credentials in cloud environments and offers alternatives for managing identities securely. It emphasizes the importance of temporary credentials and modern identity solutions to reduce vulnerabilities and improve security.
The article discusses vulnerabilities in Apache Airflow versions before 3.1.6 that can leak sensitive authentication credentials and secrets through logs and user interfaces. Two specific issues allow unauthorized users to access proxy credentials and display sensitive information in the web UI, posing risks to organizations. Immediate upgrades are recommended to mitigate these threats.
AWS provides guidance on securely implementing and managing Amazon Bedrock API keys, recommending the use of temporary security credentials via AWS STS whenever possible. It outlines best practices for using short-term and long-term API keys, including monitoring, protection strategies, and the importance of adhering to security policies through service control policies (SCPs).
A malicious post-install command executed during the installation of the nx build kit created unauthorized GitHub repositories in users' accounts, stealing sensitive information like wallets and API keys. Organizations are urged to review their GitHub activity and rotate credentials to mitigate exposure, while ongoing investigations continue into the incident.
The article discusses techniques for extracting credentials from Microsoft Deployment Toolkit (MDT) shares, highlighting the vulnerabilities that can be exploited by red teamers. It provides insights into the methodologies used to access sensitive information and emphasizes the importance of securing MDT configurations against potential threats.
The Python Software Foundation has issued a warning about new phishing attacks targeting PyPI users, urging them to reset their credentials after receiving fake emails from a fraudulent site. Victims are being misled into verifying their email for account maintenance, which could lead to credential theft and subsequent malware attacks on published packages. Users are advised to change passwords immediately and implement stronger security measures like two-factor authentication.
A critical vulnerability in Argo CD, tracked as CVE-2025-55190, allows API tokens with low project-level permissions to access sensitive repository credentials, posing a significant security risk for organizations using the tool. This flaw, affecting all versions up to 2.13.0, could enable attackers to exploit sensitive data, leading to potential code theft and supply chain attacks. Administrators are urged to update to fixed versions to mitigate the risk.