Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsDark Reading Confidential: Stop Secrets Creep Across Developer Platforms
Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms
Cybersecurity

Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms

•December 29, 2025
0
Dark Reading
Dark Reading•Dec 29, 2025

Companies Mentioned

Slack

Slack

WORK

GitHub

GitHub

Microsoft

Microsoft

MSFT

Samsung

Samsung

005930

Docker

Docker

Postman

Postman

Uber

Uber

UBER

Toyota Canada

Toyota Canada

ServiceNow

ServiceNow

NOW

Armis

Armis

Why It Matters

Secret sprawl gives attackers easy footholds, turning ordinary credentials into vectors for large‑scale breaches and financial loss. Addressing it is critical for protecting supply‑chain integrity and maintaining regulatory compliance.

Key Takeaways

  • •23 million secrets exposed publicly last year
  • •Secrets appear in code, JIRA, Slack, and CI/CD
  • •Developer friction leads to accidental credential commits
  • •AI assistants amplify secret leakage risk
  • •Maturity model: training, tooling, vaults, monitoring, secretless

Pulse Analysis

The proliferation of micro‑services, containerized workloads, and cloud‑native pipelines has multiplied the number of secrets an organization must manage. Researchers from WatchTowr, Oasis Security, and GitGuardian recently highlighted that 23 million credentials now reside in the public sphere, a figure that eclipses previous years. This surge is not merely a function of larger codebases; it reflects a cultural shift where developers prioritize speed over security, often using ad‑hoc tools that lack built‑in secret detection.

Convenience‑driven practices, such as copy‑pasting tokens into IDEs or Slack threads, are compounded by the rise of AI‑powered coding assistants that can inadvertently embed credentials during auto‑completion. The lack of frictionless pre‑commit hooks and inadequate training means that even seasoned engineers may expose production keys without realizing the risk. As attackers refine credential‑harvesting techniques, leaked secrets become a low‑effort entry point for lateral movement, ransomware deployment, and data exfiltration across supply‑chain ecosystems.

Mitigating secret creep requires a holistic maturity model. Organizations should start with comprehensive developer education and streamlined processes that remove barriers to secure secret handling. Integrating automated scanners, pre‑commit checks, and centralized vaults reduces accidental exposure, while continuous monitoring and just‑in‑time secret generation move enterprises toward a secretless architecture. Companies that adopt these practices not only lower breach likelihood but also demonstrate compliance readiness in an increasingly regulated cyber‑risk landscape.

Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...