Defense Contractor Exposes Military Training Data Through API Flaw

A defense contractor's careless API flaw left sensitive military training data vulnerable, sparking a 152-day saga between the contractor and the open-source security project Strix that ultimately led to the exposure being patched. The breach was caused by a low-privilege account having broad access to user records and…

https://osintsights.com/defense-contractor-exposes-military-training-data-through-api-flaw?utm_source=mastodon&utm_medium=social

#ApiSecurity #MilitaryTraining #DefenseContractor #DataExposure #EmergingThreats

Defense Contractor Exposes Military Training Data Through API Flaw

Learn how a defense contractor exposed military training data through an API flaw and take immediate action to secure your own data with expert insights on API security vulnerabilities now.

OSINTSights

CVE-2026-39609: Wava Payment plugin <=0.3.7 missing auth on AJAX endpoints. No patch. Unauthenticated log export, settings tamper. WAF rules or bust. #CVE #WordPress #APIsecurity

https://www.valtersit.com/cve/2026/04/cve-2026-39609/

CVE-2026-39609 | Valters IT Hub

Hardcoded API key → exposed data.
ClickUp leak:
• ~1,000 emails exposed
• No auth required
• Unpatched for 15 months
Includes users from Fortinet & Tenable.

https://www.technadu.com/clickup-hardcoded-api-key-exposes-almost-1000-customer-emails-including-government-and-corporate-giants/627160/

Thoughts?

#Infosec #AppSec #APIsecurity

APIs are your main attack surface.
83% of web traffic is APIs.
67% of companies have experienced an API breach.

Traditional firewalls can not protect what they can not see.

HuntShield discovers and tests your entire API surface:
- REST, GraphQL, gRPC
- Shadow and zombie APIs
- Authentication flaws
- Business logic vulnerabilities

https://hunter-shield.vercel.app
#APISecurity #CyberSecurity #InfoSec

HuntShield — The AI That Hunts Vulnerabilities Before Attackers Do

HuntShield AI autonomous penetration testing. Real exploits, zero false positives. Join the waitlist.

APIs and credentials are key targets in modern systems. Weak protection can expose critical data and access. Infosec K2K strengthens security with authentication and continuous monitoring.

#CyberSecurity #APIsecurity #IdentitySecurity #ZeroTrust #CyberResilience #InfosecK2K

🔴 NEW: AI API Exploits: The New Attack Vector You Must Secure

Discover how AI APIs are being exploited through prompt injection, model poisoning, and supply chain attacks. Learn the security risks of ChatGPT, Copilot, and other AI

0:00 Intro
0:04 Grab attention

https://www.youtube.com/watch?v=SpkVfWNoSXw

#AISecurity #APISecurity #PromptInjection #MachineLearning #Cybersecurity #AIAPIsecurity #promptinjection #AImodelvulnerabilities

AI API Exploits: The New Attack Vector You Must Secure

YouTube

How I Turned an AI Search Endpoint into an Internal Org Intel Leak
This vulnerability was an authentication bypass and data leak involving an AI search endpoint acting as an oracle. The application failed to implement rate limiting, exposing presigned AWS S3 URLs without authentication to clients. Bypassed rate limits and enumerated valid prefixes, the researcher discovered a blueprint containing internal organization IDs, program eligibility logic, operational flags, system behavior hints—essentially a comprehensive system map. The researcher proposed adding strict rate limiting, revoking all existing presigned URLs, proxying requests through the backend, returning only necessary fields, sanitizing S3 payloads, removing internal metadata fields, adding logging and anomaly detection for enumeration patterns as mitigation measures. Key lesson: Combinations of seemingly minor flaws can lead to scalable vulnerabilities that provide a detailed system map #BugBounty #WebSecurity #DataLeak #APISecurity #RateLimiting

https://medium.com/@shxsu1/how-i-turned-an-ai-search-endpoint-into-an-internal-org-intel-leak-72ce87f61948?source=rss

How I Turned an AI Search Endpoint into an Internal Org Intel Leak

At first, it looked like nothing.

Medium

🔐 Cyber Tip: Review and restrict API access keys regularly.

Unused or overprivileged keys are a hidden risk. Rotate them, limit permissions, and remove what is not needed.

https://zurl.co/hezSX

#Zevonix #CyberSecurity #APIsecurity #Jacksonville

🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef #OffSeq #APIsecurity #CVE202625197

🚨 Logged in ≠ authorized.

That’s how API breaches happen.
👉 https://7asecurity.com/blog/2026/03/api-security-assessment-guide/

#CyberSecurity #APISecurity #PenTesting

Your Complete Guide to Planning an API security assessment

Learn why an API security assessment is vital for protecting your hidden digital conversations & how it secures your business data. Read the full guide now.

7ASecurity Blog