Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
Researchers at ETH Zurich and Anthropic have shown that LLMs can link pseudonymous online accounts to real identities ...
API key exploitation is more than hypothetical. In a different context, a student who reportedly exposed a GCP API key on GitHub last June was left nursing a $55,444 bill (later waived by Google) ...