all tags
The Nx "s1ngularity" Attack: Inside the Credential Leak

The Nx "s1ngularity" Attack: Inside the Credential Leak

On August 26, 2025, Nx, the popular build platform with millions of weekly downloads, was compromised with credential-harvesting malware. Using GitGuardian's monitoring data, we analyzed the exfiltrated credentials and reconstructed a fuller scope of exposure.

How to Handle Secrets in Docker

How to Handle Secrets in Docker

DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools.

How GitGuardian and Delinea Solve Improper Offboarding of NHIs at Scale

How GitGuardian and Delinea Solve Improper Offboarding of NHIs at Scale

Learn how GitGuardian and Delinea solve the growing problem of improper offboarding for Non-Human Identities (NHIs). Discover why orphaned secrets are a top security risk and how to automate their lifecycle management.

How to Securely Access AWS from your EKS Cluster

How to Securely Access AWS from your EKS Cluster

Discover EKS Pod Identity Association—the modern, secure way to grant AWS permissions without the operational overhead of OIDC providers. No more duplicated IAM roles across clusters, no more trust policy updates every time you scale.

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

Start your journey to secrets-free source code

And keep your secrets out of sight