
Leaking your AWS API keys, on purpose? [Research Saturday]
CyberWire Daily
Lessons in Security and Canary Tokens
The chapter explores a cautionary tale of an intern who inadvertently exposed hardcoded login credentials on GitHub, leading to unauthorized login attempts. It discusses the use of Canary Tokens, miniature honeypots, to monitor and detect potential threats. The speaker recounts an experiment involving intentionally leaked AWS API keys to analyze responses from different automated processes and security services.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.