- Cyber Safety
- Posts
- Unlocked: API Abuse, Badge Surfing & Forgotten Machines
Unlocked: API Abuse, Badge Surfing & Forgotten Machines
Former Zillow exec targets $1.3T market
The wealthiest companies tend to target the biggest markets. For example, NVIDIA skyrocketed nearly 200% higher in the last year with the $214B AI market’s tailwind.
That’s why investors are so excited about Pacaso.
Created by a former Zillow exec, Pacaso brings co-ownership to a $1.3 trillion real estate market. And by handing keys to 2,000+ happy homeowners, they’ve made $110M+ in gross profit to date. They even reserved the Nasdaq ticker PCSO.
No wonder the same VCs behind Uber, Venmo, and eBay also invested in Pacaso. And for just $2.90/share, you can join them as an early-stage Pacaso investor today.
Paid advertisement for Pacaso’s Regulation A offering. Read the offering circular at invest.pacaso.com. Reserving a ticker symbol is not a guarantee that the company will go public. Listing on the NASDAQ is subject to approvals.
LLM Eavesdropping: Model Extraction via API Abuse
Attackers are now reverse-engineering proprietary AI models by bombarding APIs with high-frequency queries, then training replicas on the responses. This “model leakage” undermines both IP security and prompt confidentiality.
To defend, throttle query rates, obfuscate sensitive outputs, and use watermarking or response fuzzing to protect proprietary logic.
Legacy Systems: The Forgotten Attack Surface
Mainframes, Windows Server 2012, and ancient CRMs are still running critical operations in many enterprises. These unpatchable or end-of-life systems become permanent zero-days.
Apply virtual patching, segment these systems, and build migration roadmaps. If it can't be updated, it must be isolated and monitored aggressively.
Smart Contracts, Dumb Mistakes
Web3 attacks have shifted from complex exploits to simple logic errors in smart contract code. Entire treasuries are drained due to overlooked conditionals or input validation bugs.
All smart contract deployments should go through external audits, fuzz testing, and time-locked rollouts. Open-source ≠ safe.
MFA Bypass via SIM Swaps Still Plagues Enterprises
Despite push for app-based MFA, many users still rely on SMS codes, which are vulnerable to SIM swapping. Attackers exploit telecom support reps to reroute numbers and intercept logins.
Mitigation starts with telecom PINs, mandatory app-based MFA for privileged accounts, and internal alerts on number change requests.
Physical Access Still Matters: Office Intrusions via “Badge Surfing”
Unauthorized tailgating and stolen access cards remain entry points for attackers—especially in hybrid work setups where traffic is inconsistent and trust is assumed.
Install anti-tailgating tech, enforce visible ID policies, and audit entry logs for anomalies, especially after hours.
AI Hallucinations in Security Reports Pose Legal Risk
Security teams using AI to generate summaries or reports are now facing false positives or missed context. Hallucinated vulnerabilities or misinterpreted logs can trigger audits or lawsuits.
Use AI for first drafts only. Always route security documentation through expert review before publishing or escalation.