Market Cap: $4.0721T 0.06%
Volume(24h): $143.4585B -17.01%
  • Market Cap: $4.0721T 0.06%
  • Volume(24h): $143.4585B -17.01%
  • Fear & Greed Index:
  • Market Cap: $4.0721T 0.06%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$115849.501581 USD

-0.20%

ethereum
ethereum

$4657.446044 USD

-1.30%

xrp
xrp

$3.094289 USD

-0.74%

tether
tether

$1.000313 USD

-0.03%

solana
solana

$243.548889 USD

0.20%

bnb
bnb

$930.722647 USD

0.20%

usd-coin
usd-coin

$0.999696 USD

-0.01%

dogecoin
dogecoin

$0.283551 USD

1.29%

tron
tron

$0.349632 USD

-0.77%

cardano
cardano

$0.915982 USD

-1.94%

hyperliquid
hyperliquid

$54.899464 USD

-0.88%

chainlink
chainlink

$24.718086 USD

-1.68%

ethena-usde
ethena-usde

$1.001078 USD

-0.02%

sui
sui

$3.756062 USD

0.14%

stellar
stellar

$0.399024 USD

-1.87%

Cryptocurrency News Articles

Token Management in the Third-Party Supply Chain: Unveiling Hidden Risks

Sep 13, 2025 at 07:00 am

Explore the hidden risks of token management in third-party supply chains, from dormant integrations to insecure storage, and learn how to protect your business.

Token Management in the Third-Party Supply Chain: Unveiling Hidden Risks

In today's interconnected digital landscape, 'Token management, third-party supply chain, hidden risks' have become a critical concern. A single compromised token can trigger a cascade of devastating consequences, highlighting the urgent need for robust security measures.

The Invisible Threat: Compromised OAuth Tokens

The rise of cloud-native architectures has made OAuth tokens prime targets for malicious actors. As highlighted in the 2025 Salesloft Drift incident, a stolen token can bypass traditional defenses and grant persistent access to sensitive data. This incident serves as a stark reminder of the vulnerabilities lurking within third-party integrations.

A History of Token Misuse: Learning from the Past

Tokens are the currency of trust in the cloud, but they can quickly become liabilities if not managed properly. Three recurring patterns of token misuse underscore the importance of proactive security measures:

Dormant Integrations: Trust That Outlives Its Purpose

Unused integrations are like old keys left under the doormat. The 2022 GitHub breach, where threat actors exploited OAuth tokens issued to Heroku and Travis CI integrations, demonstrates the risks of neglecting dormant integrations. Even if an integration is no longer in use, it can still provide a gateway for attackers.

Insecure Token Storage: Keys Left in the Open

Tokens are only as strong as their storage. The 2023 CircleCI breach, where threat actors accessed unencrypted tokens, environment variables, and SSH keys, illustrates the dangers of lax storage practices. Storing tokens without encryption is like leaving the keys to every room on the front desk of a hotel.

No Expiration or Rotation: Keys That Never Expire

Even well-protected tokens can pose a risk if left valid indefinitely. The 2024 Internet Archive breach, where threat actors exploited GitLab tokens valid for 22 months, underscores the need for token lifecycles. Without rotation and expiration, a single compromise can lead to prolonged, large-scale breaches.

OAuth Best Practices: Recommendations for Organizations

Managing OAuth tokens is not just technical housekeeping; it’s a core part of protecting your business. To reduce the risks associated with token compromise, organizations should adopt three pillars of token security:

Token Posture Management: Know What You Have and Control It

Visibility is key. Organizations must track all OAuth tokens, API keys, and service account credentials in circulation. Without an inventory, it’s impossible to know what’s at risk. Controlling token lifetimes reduces the window of opportunity for threat actors.

Secure Token Storage: Protect the Keys Themselves

Tokens should be treated like encryption keys. They should never be stored in plaintext or within source code. Vendors and internal teams must demonstrate secure storage practices.

Runtime Monitoring and Detection: Watch for Abuse and Act Fast

Even with good hygiene, breaches can still happen. Monitoring and rapid response are essential. Being able to detect compromised tokens and contain the impact is crucial.

The Way Forward: Strengthening Token Posture

Compromised OAuth tokens are a dangerous vulnerability. Breaches like those at Microsoft, CircleCI, and the Internet Archive highlight a shared problem: token and integration management can be an industry weak spot. Every organization must raise its baseline and strengthen its token posture management.

A Word on Crypto Treasuries

The trend of companies stockpiling Bitcoin and other tokens on their balance sheets introduces new layers of risk, including management competence, debt obligations, and cybersecurity. Investors may think they’re backing Bitcoin, but they’re actually exposed to a company’s entire risk profile. So, buyer beware!

So, folks, keep those tokens close and your integrations closer. The digital world's a wild place, but with a little vigilance, we can keep the bad guys at bay. Stay safe out there!

Original source:paloaltonetworks

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Sep 15, 2025