Now Hiring: Are you a driven and motivated 1st Line IT Support Engineer?
Call Anytime 24/7
A massive campaign targeting exposed Git configurations has siphoned credentials, cloned private repositories, and extracted cloud credentials from the source code.