Facebook
Britain's News Portal
Around The Clock
BREAKING
Loading latest headlines…

Google API Keys Still Active for 23 Minutes After Deletion: A Security Concern

Researchers have discovered that Google API keys remain usable for a significant period after they have been deleted, leaving users vulnerable to potential data breaches and large bills.

  • Google API keys remain active for 23 minutes after deletion
  • This poses a significant security risk for users, particularly those in the cloud computing and IoT sectors
  • Researchers recommend that users regularly review and update their API key configurations

A recent study has highlighted a concerning security vulnerability in Google's API key management system. Researchers at security firm Wiz discovered that API keys remain active for up to 23 minutes after they have been deleted, leaving users vulnerable to potential data breaches and large bills.

The researchers tested this by creating a Google Cloud API key, deleting it, and then attempting to use it. To their surprise, the key remained active and functional for a significant period, giving malicious actors ample time to exploit the vulnerability.

According to the researchers, this issue has significant implications for users of cloud computing and IoT services, which rely heavily on API keys for authentication and authorisation. If left unchecked, this vulnerability could lead to data breaches, financial losses, and reputational damage.

Wiz recommends that users regularly review and update their API key configurations to mitigate this risk. This includes deleting unused keys, rotating new keys, and monitoring key usage for any suspicious activity.

Google has yet to comment on this issue, but experts warn that users should take immediate action to protect themselves from potential attacks.

As the UK's digital landscape continues to evolve, security concerns like this highlight the importance of robust data protection and API key management. UK businesses and individuals alike must remain vigilant and take proactive steps to safeguard their digital assets.

Why this matters: This security vulnerability has significant implications for UK businesses and individuals, particularly those in the cloud computing and IoT sectors, where API keys are used to authenticate and authorise access to sensitive data.

What this means for you: What this means for you: If you use cloud computing or IoT services, it's essential to review your API key configurations and take steps to protect yourself from potential data breaches and financial losses.

Get the news that matters.

Join thousands of readers getting the best of British news straight to their inbox.