all tags
Codecov supply chain breach - explained step by step

Codecov supply chain breach - explained step by step

Codecov recently had a significant breach as attackers were able to put a backdoor into Codecov to get access to customers' sensitive data. This article reviews exactly what happened, how attackers gained access, how they used sensitive information and of course, what to do if you were affected.

Initial Access Techniques - MITRE ATT&CK

Initial Access Techniques - MITRE ATT&CK

This article discusses the 9 initial access techniques as outlined in the MITRE ATT&CK framework and provides examples of how attackers have used these techniques as well as preventative measures that can be put in place.

The journey to becoming a backend engineer at GitGuardian

The journey to becoming a backend engineer at GitGuardian

Samuel is a backend engineer working on expanding PII detection within GitGuardian's secrets team. Samuel studied software engineering at EISTI in Paris specializing in cybersecurity and shared with us the journey he took to work at GitGuardian.

Shift Left - Moving security to the development phase - the case of secrets detection in code repositories

Shift Left - Moving security to the development phase - the case of secrets detection in code repositories

With the expansion of the DevOps and DevSecOps models, the concept of “shift left” in the context of the development lifecycle has become quite popular. This article looks at practical ways organizations implement a Shift Left approach to development.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down