Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Api Test Firm exposed customer data during the Apisec Security Break


API Test Firm Apisec, a few days has provided an internet connected client data for several days in a few days.

Until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, 2018, until 2018, until 2018, 2018, until 2018, by 2018, until 2018, by 2018, by 2018, by 2018, until 2018, 2018, until 2018, 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018, 2018, until 2018, until 2018, until 2018, until 2018, until 2018, until 2018 Information about the security posture of the corporate clients of the detained notes, as well as users, as well as APISEC’s corporate clients.

According to the security research firm, according to the database, customers were created by many of the information that watched customers’ APIs for weaknesses.

Highguard found information leaked on March 5 and said Apisec on the same day. Apisec, soon provided the database.

APISEC, who claims to work with Fortune 500, pays a company that tests API in various customers. APIS allows you to contact each other as a company’s rear systems with two things or more to contact each other on the Internet. Invalid API, siphon sensitive data from a company’s systems can be exploited.

In A report published nowShared Upguard with Shared TechCrunch, said that the information exposed to the exposed information is that the information exposed to the customer’s account is effective or not. Upguard said this information could give a harmful enemy useful technical intelligence.

As a statement of Techcrunch, the founder of the apisculer Lakhani, first fell from the security break, the database was “test information” used to test the Apisecin product and debug. Lakhani added that the database was “not a production base” and “Customer data was not in the database.” Lakhani confirmed that there was no “human error” and a harmful event.

“We quickly close the access to the public quickly. The data in the database cannot be used,” he said.

However, Upguard also included the results of the results of the real world corporate clients related to the real world corporate clients, including the results of the end points of the API.

Data have also included some personal information about names and email addresses, including employees and users of customers.

Lakhani withdrawn while the TechCrunch company provides evidence of leaking customer information. In a subsequent email, the founding company’s report Day and “Went back and rebuild the investigation this week.”

Lakhani, the company’s personal information was reported to be in the database open to the public. Lakhani will not give a copy of the information that violates the information allegedly sent to customers when asked.

According to the company’s information violation notice law, when the company plans to inform the general information of state lawyers, Lakhani refused to comment.

Highguard, a custom key set for AWS and credentials for information and credentials for information and credentials, but also the credentials would be illegal because the credentials would be illegal. Apisec said the buttons belonged to an employee who left the company two years ago and went to the company. It is not clear why the AWS keys are left on the base.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *