When we talk about secret sprawl, we immediately think about API keys, passwords, credentials or any secret lurking in some source code. For sure, source code is very tightly linked to secret sprawl.
New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images. A new security analysis of the 4 million container ...