{"slug": "threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion", "title": "Threat hunters find Google API keys still usable 23 minutes after deletion", "summary": "Threat hunters discovered Google API keys remained usable for 23 minutes after being deleted. This finding highlights a significant security risk where deleted credentials can still be exploited for a period of time.", "body_md": "MOST POPULAR\nEVENTS\n-\nThe Hardware Crunch: How Supply Chain Turbulence Is Forcing a New IT Playbook\nInfrastructure teams are facing a perfect storm: extended hardware lead times, rising costs driven by AI demand, and accelerated platform timelines.\n-\nOvercoming the trade-offs in data sovereignty\nWhat does data sovereignty actually mean for your network, which trade-offs are unavoidable? Learn more.\n-\nFrom Prompt to Exploit: How LLMs Are Changing API Attacks\nModern applications are API-driven, interconnected, and often over-permissioned, making them an ideal target for AI-assisted attacks.\n-\nArchitecting the Future: Unlocking Enterprise Data Services for Kubernetes\nJoin us to discover how to eliminate infrastructure silos and establish a standardized, enterprise-grade cloud-native platform.\n-\nCatch the Advanced Attacks Microsoft 365 Misses with Behavioral AI Security\nMicrosoft 365 is the backbone of enterprise communication, and its native security filters out the known and the noisy.\n-\nHow Agents are Reshaping AI Security\nAI adoption is accelerating and with it comes a new security challenge.\n-\nHow Agents are Reshaping AI Security\nAI adoption is accelerating and with it comes a new security challenge.\n-\nAI Found the Problem. Now What?\nAI is transforming the software development lifecycle, helping teams identify and remediate vulnerabilities before they reach production.\n-\nVirtual Cyber Recovery Sim\nStep into the chaos of a live ransomware breach, test your response skills, and team up with other IT and security pros to outsmart cybercriminals\n-\nVirtual Cyber Recovery Simulation\nRansomware attacks aren’t slowing down, and neither are we. Druva’s hit event, Escape Ransomware, is now fully virtual.\nAI\n-\nSoftware\nMarketing demanded IT add website feature that was already working\nTechie regrets not taking credit for getting it done with amazing speed\n-\nSecurity\nCisco used AI to write security incident reports, with mixed results\nYou’ll need a lot of detailed prompts to get solid output - and even then it may have errors and typos\n-\nSystems\nAlibaba just admitted it’s struggling to keep up with rival chipmakers and AI shops\nReveals decent new homegrown accelerator and tiny production volumes\n-\nSecurity\nDems slam Trump for making cybersecurity hold out the tin cup while splurging on ballroom and Jan. 6 'slush fund'\n'Budgets are moral documents,' Rep. Delia Ramirez said\n-\nAI + ML\nGoogle explains how it will infuse ads into AI answers\nJust like in The Truman Show\nInfosec\n-\nSoftware\nMarketing demanded IT add website feature that was already working\nTechie regrets not taking credit for getting it done with amazing speed\n-\nSecurity\nCisco used AI to write security incident reports, with mixed results\nYou’ll need a lot of detailed prompts to get solid output - and even then it may have errors and typos\n-\nSystems\nAlibaba just admitted it’s struggling to keep up with rival chipmakers and AI shops\nReveals decent new homegrown accelerator and tiny production volumes\n-\nSecurity\nDems slam Trump for making cybersecurity hold out the tin cup while splurging on ballroom and Jan. 6 'slush fund'\n'Budgets are moral documents,' Rep. Delia Ramirez said\n-\nAI + ML\nGoogle explains how it will infuse ads into AI answers\nJust like in The Truman Show\nFOSS\n-\nMarketing demanded IT add website feature that was already working\nTechie regrets not taking credit for getting it done with amazing speed\n-\nCisco used AI to write security incident reports, with mixed results\nYou’ll need a lot of detailed prompts to get solid output - and even then it may have errors and typos\n-\nAlibaba just admitted it’s struggling to keep up with rival chipmakers and AI shops\nReveals decent new homegrown accelerator and tiny production volumes\n-\nDems slam Trump for making cybersecurity hold out the tin cup while splurging on ballroom and Jan. 6 'slush fund'\n'Budgets are moral documents,' Rep. Delia Ramirez said\n-\nGoogle explains how it will infuse ads into AI answers\nJust like in The Truman Show\n-\nThreat hunters find Google API keys still usable 23 minutes after deletion\nPlenty of time for bad actors to grab data or hit you with a giant bill\nFEATURES\n-\nEurope built sovereign clouds to escape US control. Then forgot about the processors\n-\nNobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data\n-\nEurope wants out from under US tech – but first it has to find the exits\n-\nGNOME may rule Ubuntu Resolute Raccoon, but X.org isn't roadkill yet\n-\nOpenClaw, but in containers: Meet NanoClaw\n-\nOpen source registries don't have enough money to implement basic security\n-\nContain your Windows apps inside Linux Windows\n-\nThe Linux mid-life crisis that's an opportunity for Tux-led transformation\n-\nToo much AI for some, too little for others: Why AMD can't win with investors\n-\nHow agentic AI can strain modern memory hierarchies", "url": "https://wpnews.pro/news/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion", "canonical_source": "https://www.theregister.com/devops/2026/05/21/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion/5244504", "published_at": "2026-05-21 20:23:00+00:00", "updated_at": "2026-05-22 08:14:37.785937+00:00", "lang": "en", "topics": ["cybersecurity"], "entities": ["Google"], "alternates": {"html": "https://wpnews.pro/news/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion", "markdown": "https://wpnews.pro/news/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion.md", "text": "https://wpnews.pro/news/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion.txt", "jsonld": "https://wpnews.pro/news/threat-hunters-find-google-api-keys-still-usable-23-minutes-after-deletion.jsonld"}}