Technical Leakage Detection
Detect exposed sensitive code, access keys, and technical information
Technical Leakage Detection Overview
SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...
Access Keys Exposed: More Than 40% Are For Database Stores
Over a 30-day period, we scanned more than 150 million entities from GitHub, GitLab, and Pastebin. During this time, our technology assessed and categorized almost 800,000 access keys and secrets.
Exposed Access Key Datasheet
SearchLight provides an industry-leading and scalable way to detect exposed access keys in near-real-time, complete with the context and guidance needed to effectively triage and respond.
Outside-In Intelligence for DevSecOps - Digital Shadows
Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.
Catch Up on the ShadowTalk Threat Intelligence PodcastListen Now
Detecting Unauthorized Code Commits
See how a technology company discovered credentials for their CRM platform.
From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover
Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...
Unauthorized Commit to Public Code Repository Risk
Leaked access keys. Hard-coded, clear-text credentials. Proprietary source code. These are just some of the things that we find organizations exposing via public repositories.
Reducing technical leakage: Detecting software exposure from the outside-in
A combination of the rapid delivery of software, onset of digital transformation, and poor security practices, have increased the likelihood of sensitive technical data being exposed online.
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
Source Code and Admin Password Shared on Public Site by Developer
Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.