Video: The Teenage Millionaire Hacker
Video: The Teenage Millionaire Hacker
It’s no secret that developers often inadvertently expose AWS access keys online and we know that these keys are being scraped and misused by attackers before organizations get a chance to revoke them. Clutch Security researchers performed a test to see just how quickly that can happen. They dispersed AWS access keys (in different scenarios) on: Code hosting and version control platforms: GitHub and GitLab Public code repositories: Docker Hub (for containers), npm (for JavaScript … More →
The post The shocking speed of AWS key exploitation appeared first on Help Net Security.