When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Sometimes, developers will include valuable secrets in private repositories, since its faster, and more convenient.
It generally isnt a problem, as long as the repositories are properly secured.
Image Credit: Shutterstock
They divided them into 12,000 IP ranges, and looked for exposed Git configuration files.
In total, the stolen archives were 1TB in size, and included 15,000 credentials from 67,000 URLs.
ViaBleepingComputer