Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 2 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
Thousands of Public Google Cloud API Keys Exposed with Gemini Access — New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The problem occurs when users enable the Gemini API on a Google Cloud project (i.e., Generative Language API), causing the existing API keys in that project, including those accessible via the website JavaScript code, to gain surreptitious access to Gemini endpoints without any warning or notice. With a valid key, an attacker can access uploaded files, cached data, and even rack up LLM usage charges, Truffle Security said. The issue has since been plugged by Google. Read more
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed. More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizati… More...
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed. More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
ImmuniWeb is hosting an interactive webinar “Web, Mobile & Cloud Penetration Testing in 2026: Best Practices” for all ou… More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...