[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f8Z3zgwX5GkiqH0CTzN9SlcON61o1-1Xa3jv3qfjxGPA":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":6,"ai_summary":8,"brief":9,"full_text":10,"url":11,"image_url":10,"published_at":12,"ingested_at":13,"relevance_score":14,"entities":15,"category_id":24,"category":25,"article_tags":28},"8fc13a07-6fdf-4c6c-ba8c-d69e802cbce0","Lul...\n\nCISA Admin Leaked AWS GovCloud Keys on GitHub\n\nhttps:\u002F\u002Ft.co\u002FV8j07muRXS","lul-cisa-admin-leaked-aws-govcloud-keys-on-github-https-t-co-v8j07murxs-b16168","A CISA administrator inadvertently leaked AWS GovCloud access keys to a public GitHub repository. The incident highlights credential management failures and the risk of hardcoded secrets in version control systems. AWS GovCloud provides secure cloud infrastructure for U.S. government agencies, making this exposure a significant security and compliance concern.","CISA administrator accidentally exposed AWS GovCloud credentials on GitHub.",null,"https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2056479796209631536","2026-05-18T20:59:25+00:00","2026-05-18T21:00:11.019002+00:00",9,[16,19,21],{"name":17,"type":18},"Amazon Web Services (AWS)","vendor",{"name":20,"type":18},"CISA",{"name":22,"type":23},"GitHub","technology","c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73",{"id":24,"icon":10,"name":26,"slug":27},"Incident Response","incident-response",[29,34,39],{"category":30},{"id":31,"icon":10,"name":32,"slug":33},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":35},{"id":36,"icon":10,"name":37,"slug":38},"2e06f76c-d5b9-4f54-9eef-4d3447b10730","Breaches","breaches",{"category":40},{"id":41,"icon":10,"name":42,"slug":43},"c5c77cdb-f7d7-4990-9436-c81dcbff1163","Policy","policy",[]]