See how a technology company discovered credentials for their CRM platform.
Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence ...
Other content in this Stream
SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...
Over a 30-day period, we scanned more than 150 million entities from GitHub, GitLab, and Pastebin. During this time, our technology assessed and categorized almost 800,000 access keys and secrets.
SearchLight provides an industry-leading and scalable way to detect exposed access keys in near-real-time, complete with the context and guidance needed to effectively triage and respond.
Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.
Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...
Leaked access keys. Hard-coded, clear-text credentials. Proprietary source code. These are just some of the things that we find organizations exposing via public repositories.
A combination of the rapid delivery of software, onset of digital transformation, and poor security practices, have increased the likelihood of sensitive technical data being exposed online.
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.