Thinking Like a Hacker

“Do Not Push To Production” And Other Insecure Code, Demonstrated By An Ethical Hacker
Enjoy highlights from GitGuardian's ethical hacking webinar with a friend from Snyk ...

Thinking Like a Hacker: Finding Leaked Code on GitHub
Continuing our series about potential attack scenarios, learn how a very easy configuration mistake on GitHub can lead to a major security breach ...

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Fourth case: secrets are stolen with a malicious GitHub action ...

Thinking Like a Hacker: Commanding a Bot Army of Leaked Twitter Accounts
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Third case: Twitter API keys are used to pump an ...

Thinking Like a Hacker: AWS Keys in Private Repos
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private ...

Thinking Like a Hacker: Abusing Stolen Private Keys
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. First case: an RSA private key is found in a ...