Trufflehog made headlines during the recent "Shai-Hulud" campaign, in which threat actors used it to search for passwords and sensitive information. [1] According to the Trufflehog GitHub page:
Trufflehog made headlines during the recent "Shai-Hulud" campaign, in which threat actors used it to search for passwords and sensitive information. [1] According to the Trufflehog GitHub page:
www.bankinfosecurity.com/uk-hospital-...
monde-diplomatique.de/artikel/!611...
monde-diplomatique.de/artikel/!611...
But Peter Hummelgaard wants to bring it back.
😡 He now even claims your activism was paid for by Big Tech! 😡
Fight for #encryption & #privacy 🔒️
Source: netzpolitik.org/2025/absurd-...
#No2Backdoors #CyberSecurityMonth #CyberSecurity #Security
But Peter Hummelgaard wants to bring it back.
😡 He now even claims your activism was paid for by Big Tech! 😡
Fight for #encryption & #privacy 🔒️
Source: netzpolitik.org/2025/absurd-...
#No2Backdoors #CyberSecurityMonth #CyberSecurity #Security
In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long, iterative story on his webpage about how he got phished. Worth reading.
In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long, iterative story on his webpage about how he got phished. Worth reading.