Technical Leakage Detection
Detect exposed sensitive code, access keys, and technical information
Technical Leakage Detection Overview
SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...
Outside-In Intelligence for DevSecOps - Digital Shadows
Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.
Detecting Unauthorized Code Commits
See how a technology company discovered credentials for their CRM platform.
Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick
Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories.
Unauthorized Commit to Public Code Repository Risk
Leaked access keys. Hard-coded, clear-text credentials. Proprietary source code. These are just some of the things that we find organizations exposing via public repositories.
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
DevSecOps: Continued Database Exposures Point to Growing Challenges
Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...
Source Code and Admin Password Shared on Public Site by Developer
Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.
Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings
Digital Shadows’ Russian-linguists discovered a post from 6 July 2018 on exploit[.]in that provided files and source code that were ...