Answer:
Attackers can exploit insecurely stored API keys by intercepting and using them to impersonate the web application in third-party services, gaining unauthorized access.
Attackers can exploit insecurely stored API keys by intercepting and using them to impersonate the web application in third-party services, gaining unauthorized access.
You may be interested in:
Web Security MCQs