Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

SharePoint Zero-Day Exploits Highlight Hidden Secrets Risk in Document Collaboration Tools

The recent SharePoint zero-day exploits expose a critical blind spot: hardcoded secrets hidden in collaboration tools. While teams secure code repositories, API keys and credentials lurking in SharePoint documents create dangerous attack vectors for lateral movement.

GitGuardian Demo: Master Non-Human Identity (NHI) & Secrets Security at Scale

This platform demo shows how to bring order to the chaos of NHIs, reduce risk, and empower your teams to move faster and safer. Discover how GitGuardian finds leaked secrets everywhere (code, CI/CD, docs, containers), enforces policies for NHI governance, and enables efficient, automated remediation. Get critical analytics to improve your security posture. GitGuardian scales with your organization via SaaS or self-hosted options.

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows

GitGuardian, the leader in automated secrets detection and remediation, today announced the launch of its Model Context Protocol (MCP) Server, a powerful new infrastructure designed to bring AI-assisted secrets security directly into developer environments. As intelligent agents begin to reshape the software development landscape, GitGuardian's MCP server marks a pivotal shift in aligning security practices with an environment where code is shipped faster than ever.

Exploiting Public APP_KEY Leaks to Achieve RCE in Hundreds of Laravel Applications

Laravel APP_KEY leaks enable RCE via deserialization attacks. Collaboration with Synacktiv scaled findings to 600 vulnerable applications using 260K exposed keys from GitHub. Analysis reveals 35% of exposures coincide with other critical secrets including database, cloud tokens, and API credentials.

Agent-Based AI and the Machine Identity Revolution Are Reshaping Security

Is agentic AI the productivity revolution we've been waiting for, or a security nightmare in the making? With AI agents now outnumbering humans and secrets proliferating across enterprise systems, the answer isn't simple. Read our insights from SecDays {France} 2025.