Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting

We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here's how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date.

How Cybercriminal Organizations Weaponize Exposed Secrets

The threat GitGuardian has long-anticipated is now a reality: criminal groups are executing systematic attacks targeting hardcoded credentials and over-permissive IAM configurations. The situation escalated when Shiny Hunters and Crimson Collective formed an alliance to coordinate efforts.

Zero-Friction Secret Revocation Strategy Explained

GitGuardian users can now revoke certain valid secrets directly from incident pages in seconds, eliminating the need to switch between multiple tools and platforms when the danger is very real. As attackers move faster than ever, security teams and developers need better tools and methods to ensure their most prized secrets can be invalidated in seconds, halting any attackers who might have stolen them or discovered them leaked publicly.