A set of three distinct but related attacks, dubbed 'Clone2Leak,' can leak credentials by exploiting how Git and its credential helpers handle authentication requests. The attack can compromise ...
Threat actors are intensifying internet-wide scanning for Git configuration files that can reveal sensitive secrets and authentication tokens used to compromise cloud services and source code ...
GreyNoise saw a significant increase in scanning activity IPs from Singapore are looking for exposed Git config files, also in Singapore The files could contain sensitive information such as login ...