TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly … Continue reading What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed