Thinking Like a Hacker: Finding Leaked Code on GitHub

Thinking Like a Hacker: Finding Leaked Code on GitHub

| | Thinking Like a Hacker
Continuing our series about potential attack scenarios, learn how a very easy configuration mistake on GitHub can lead to a major security breach ...
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

| | Thinking Like a Hacker
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Fourth case: secrets are stolen with a malicious GitHub action ...
Thinking Like a Hacker: Commanding a Bot Army of Leaked Twitter Accounts

Thinking Like a Hacker: Commanding a Bot Army of Leaked Twitter Accounts

| | Thinking Like a Hacker
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Third case: Twitter API keys are used to pump an ...
Thinking Like a Hacker: AWS Keys in Private Repos

Thinking Like a Hacker: AWS Keys in Private Repos

How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private ...
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. First case: an RSA private key is found in a ...