GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub

Hackread – Cybersecurity News, Data Breaches, AI and More
Actively Exploited

Overview

GitGuardian has reported a significant increase in the number of sensitive data leaks related to AI services, revealing that around 29 million secrets were publicly exposed on GitHub. This represents an 81% surge compared to previous records. These leaks often include API keys, passwords, and other confidential information that can be exploited by malicious actors. The findings raise concerns about the security practices of developers and organizations using AI tools, as these leaks can lead to unauthorized access and data breaches. Companies need to adopt stronger security measures to safeguard their sensitive information and prevent further exposure.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: GitHub, AI services, API keys, sensitive data
  • Action Required: Companies should implement better security practices, including regular audits of code repositories and using secret management tools to prevent leaks.
  • Timeline: Disclosed on March 17, 2026

Original Article Summary

New York, NY, 17th March 2026, CyberNewswire

Impact

GitHub, AI services, API keys, sensitive data

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Disclosed on March 17, 2026

Remediation

Companies should implement better security practices, including regular audits of code repositories and using secret management tools to prevent leaks.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

Europe sanctions Chinese and Iranian firms for cyberattacks

BleepingComputer

The European Union Council has imposed sanctions on three Chinese and Iranian firms, along with two individuals, due to their involvement in cyberattacks aimed at critical infrastructure in Europe. These actions come as a response to increasing concerns over cyber threats that target essential services and systems, which could potentially disrupt daily life and national security. The sanctions serve as a warning to other entities that engage in similar malicious activities. This incident underscores the ongoing geopolitical tensions surrounding cybersecurity and the measures governments are willing to take to protect their infrastructures. The names of the sanctioned entities have not been disclosed, but the EU's firm stance indicates a commitment to countering cyber threats collaboratively.

Mar 17, 2026

Android OS-Level Attack Bypasses Mobile Payment Security

Infosecurity Magazine

Researchers have discovered a serious vulnerability in Android that allows attackers to hijack mobile payment applications using a technique called LSPosed-based runtime manipulation. This attack can bypass security measures such as SIM binding, which is intended to protect users' financial transactions. As a result, anyone using affected payment apps could be at risk of fraud and unauthorized transactions. This incident highlights the ongoing challenges in mobile security, especially for users who rely on their devices for financial activities. Users should be cautious and consider reviewing their app security settings until further protections are implemented.

Mar 17, 2026

UK Companies House Exposed Details of Millions of Firms

SecurityWeek

The UK Companies House has acknowledged a security vulnerability that potentially exposed sensitive details of millions of businesses. This flaw could allow unauthorized individuals to access company information and modify official records. The agency has confirmed that the issue could have serious implications for the integrity of business data in the UK, raising concerns about identity theft and fraud. As Companies House holds critical information about registered companies, this exposure poses a significant risk to both businesses and consumers. Authorities are urging companies to remain vigilant and review their security practices in light of this breach.

Mar 17, 2026

Warlock Ransomware Group Augments Post-Exploitation Activities

darkreading

The Warlock Ransomware Group has recently enhanced its operations by using a new technique called BYOVD, which allows them to conduct stealthier activities across networks. This technique, combined with other tools, enables the group to exploit systems more effectively and avoid detection. The implications of this development are significant, as it suggests that organizations may be at greater risk of ransomware attacks that can spread quickly across their networks. Companies should be vigilant and ensure their security measures are robust enough to counter these evolving tactics. Users need to stay informed about such threats to protect their data and systems.

Mar 17, 2026

RondoDox botnet expands arsenal targeting 174 flaws, and hits 15,000 daily exploit attempts

Security Affairs

The RondoDox botnet is ramping up its activities, now targeting 174 different vulnerabilities with an alarming rate of 15,000 exploitation attempts each day. This more focused campaign signals a strategic shift in how the botnet operates, making it a significant concern for cybersecurity experts. Organizations and individuals who use software with these vulnerabilities are at heightened risk of being attacked. The botnet's ability to exploit these flaws could lead to unauthorized access, data breaches, and other serious security incidents. As researchers continue to monitor this situation, it's crucial for affected users to take preventive measures and patch their systems promptly.

Mar 17, 2026

'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

Infosecurity Magazine

Researchers have identified a security vulnerability called 'CursorJack' that affects the Cursor IDE, a development environment used for coding, particularly in AI projects. This flaw allows attackers to exploit malicious deeplinks, which can lead to unauthorized code execution if users inadvertently approve these links. The risk is significant because it can compromise the integrity of the code being developed, potentially leading to the introduction of harmful code into applications. Developers using the Cursor IDE should be aware of this vulnerability and take precautions to avoid falling victim to such attacks. The implications extend beyond individual users, as compromised code could lead to broader security issues in applications that rely on this development environment.

Mar 17, 2026