all tags
Microsoft AI involuntarily exposed a secret giving access to 38TB of confidential data for 3 years

Microsoft AI involuntarily exposed a secret giving access to 38TB of confidential data for 3 years

Discover how an overprovisioned SAS token exposed a massive 38TB trove of private data on GitHub for nearly three years. Learn about the misconfiguration, security risks, and mitigation strategies to protect your sensitive assets.

From GitHub Leak to Pwn: A Hacker’s Kill Chain

From GitHub Leak to Pwn: A Hacker’s Kill Chain

Discover how seemingly minor mistakes, like leaking a secret to a non-publicly accessible resource, can lead to a major breach. In this engaging scenario, see how an attacker would chain vulnerabilities to access highly sensitive areas, and learn a valuable lesson along the way.

Honeytoken Adventure: From Beta to Beyond

Honeytoken Adventure: From Beta to Beyond

Read the journey of GitGuardian Honeytoken, a tool that is changing the game in supply chain protection and threat detection. Explore its features, the motivation behind its creation, and what's next.

8.5% of Docker Images Expose API and Private Keys

8.5% of Docker Images Expose API and Private Keys

A new comprehensive study by researchers at RWTH Aachen University in Germany did a study on over 300,000 docker images finding that 8.5% contained API keys and private keys that malicious actors could exploit in the wild.

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

The figures are precise: stolen credentials remain the most common cause of a data breach. So how are there still thousands of hardcoded secrets hiding in source code, CI/CD pipelines, or Docker images, and, more importantly, how should we deal with them?

Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

This tutorial helps you better understand AWS Secrets Manager, how it works under the hood and how to access it from Kubernetes clusters.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down