Technical Leakage Detection

Detect exposed sensitive code, access keys, and technical information

  • Technical Leakage Detection Overview

    Technical Leakage Detection Overview

    SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...

    Read Report
  • Access Keys Exposed: More Than 40% Are For Database Stores

    Access Keys Exposed: More Than 40% Are For Database Stores

    Over a 30-day period, we scanned more than 150 million entities from GitHub, GitLab, and Pastebin. During this time, our technology assessed and categorized almost 800,000 access keys and secrets.

    Read Post
  • Exposed Access Key Datasheet

    Exposed Access Key Datasheet

    SearchLight provides an industry-leading and scalable way to detect exposed access keys in near-real-time, complete with the context and guidance needed to effectively triage and respond.

    Read Report
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Outside-In Intelligence for DevSecOps - Digital Shadows21:17

    Outside-In Intelligence for DevSecOps - Digital Shadows

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Watch Video
  • Catch Up on the ShadowTalk Threat Intelligence Podcast

    Listen Now
  • Detecting Unauthorized Code Commits

    Detecting Unauthorized Code Commits

    See how a technology company discovered credentials for their CRM platform.

    Read Report
  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • Unauthorized Commit to Public Code Repository Risk4:50

    Unauthorized Commit to Public Code Repository Risk

    Leaked access keys. Hard-coded, clear-text credentials. Proprietary source code. These are just some of the things that we find organizations exposing via public repositories.

    Watch Video
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    A combination of the rapid delivery of software, onset of digital transformation, and poor security practices, have increased the likelihood of sensitive technical data being exposed online.

    Read Post
  • How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she

    Read Post
  • Source Code and Admin Password Shared on Public Site by Developer

    Source Code and Admin Password Shared on Public Site by Developer

    Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.

    Read Report
  • loading
    Loading More...