Hacker And The Fed cover image

Copy Pasting Commands Is the New Phishing

Hacker And The Fed

00:00

How researchers find leaked tokens

Hector walks through scanning repos, regex searches, and why tokens can persist undetected amid noisy findings.

Play episode from 33:20
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app