YoutTube: https://www.youtube.com/c/TruffleSecurity
LinkedIn: https://www.linkedin.com/company/trufflesecurity/
TikTok: https://www.tiktok.com/@trufflesecurity
⚒️ The same tools attackers use to find secrets are the ones defenders need too.
🐷 That’s why threat intel groups recommend TruffleHog.
🔗 Learn why it shows up in your logs: trufflesecurity.com/blog/truffle...
⚒️ The same tools attackers use to find secrets are the ones defenders need too.
🐷 That’s why threat intel groups recommend TruffleHog.
🔗 Learn why it shows up in your logs: trufflesecurity.com/blog/truffle...
☁️ GCP’s strict image controls show clear results vs. AWS & Azure.
🔗 Full CloudQuarry report: trufflesecurity.com/blog/guest-p...
☁️ GCP’s strict image controls show clear results vs. AWS & Azure.
🔗 Full CloudQuarry report: trufflesecurity.com/blog/guest-p...
🔗A guest post by Sharon Brizinov: trufflesecurity.com/blog/guest-p...
🔗A guest post by Sharon Brizinov: trufflesecurity.com/blog/guest-p...
🌐 Install it directly from the BApp Store
🔍Scan web traffic for live, verified credentials—active & exploitable
Because secrets don’t just leak in code… 😬
🔗 trufflesecurity.com/blog/introdu...
🌐 Install it directly from the BApp Store
🔍Scan web traffic for live, verified credentials—active & exploitable
Because secrets don’t just leak in code… 😬
🔗 trufflesecurity.com/blog/introdu...
🚨 ~12K live API keys & passwords
🌐 2.76M affected pages
🔄 One key appeared 57K+ times
🔑 219 secret types (AWS root keys, Slack webhooks, etc.)
🔗 Full research: trufflesecurity.com/blog/researc...
🚨 ~12K live API keys & passwords
🌐 2.76M affected pages
🔄 One key appeared 57K+ times
🔑 219 secret types (AWS root keys, Slack webhooks, etc.)
🔗 Full research: trufflesecurity.com/blog/researc...
Do you expect to find an AWS key in your bed?
We found one, and we removed it. We’re sleeping great now.
🔗 trufflesecurity.com/blog/removing-jeff-bezos-from-my-bed
Do you expect to find an AWS key in your bed?
We found one, and we removed it. We’re sleeping great now.
🔗 trufflesecurity.com/blog/removing-jeff-bezos-from-my-bed
⚡ Part 1 of 2: How Aho-Corasick + CPU optimizations deliver 11-17% faster scans with precomputed keyword matching. 🚀
👉 trufflesecurity.com/blog/under-t...
⚡ Part 1 of 2: How Aho-Corasick + CPU optimizations deliver 11-17% faster scans with precomputed keyword matching. 🚀
👉 trufflesecurity.com/blog/under-t...
🌟 TLDR: Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees
👉 full blog: trufflesecurity.com/blog/million...
🌟 TLDR: Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees
👉 full blog: trufflesecurity.com/blog/million...
Here's how to spray painting on other fraudster's GitHub Activity Graph.
trufflesecurity.com/blog/vigilan...
Here's how to spray painting on other fraudster's GitHub Activity Graph.
trufflesecurity.com/blog/vigilan...
⚠️ Extends to Azure, Slack & more—increasing risk with poor token handling.
🛑 The issue isn’t OAuth; it’s how platforms secure tokens.
👉 trufflesecurity.com/blog/mishand...
⚠️ Extends to Azure, Slack & more—increasing risk with poor token handling.
🛑 The issue isn’t OAuth; it’s how platforms secure tokens.
👉 trufflesecurity.com/blog/mishand...
💡 Why it matters:
🔍 APKs often leak secrets, but scanning was slow & complex.
🔓 Now it’s fast, efficient & scalable.
📊 Tested on WhatsApp & Facebook Messenger—up to 16.5x faster!
👉https://trufflesecurity.com/blog/cracking-open-apk-files-at-scale
💡 Why it matters:
🔍 APKs often leak secrets, but scanning was slow & complex.
🔓 Now it’s fast, efficient & scalable.
📊 Tested on WhatsApp & Facebook Messenger—up to 16.5x faster!
👉https://trufflesecurity.com/blog/cracking-open-apk-files-at-scale