{"id":223121,"date":"2025-10-09T00:05:43","date_gmt":"2025-10-09T05:05:43","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/10\/the-worlds-most-sensitive-computer-code-is-vulnerable-to-attack-a-new-encryption-method-can-help"},"modified":"2025-10-09T00:05:43","modified_gmt":"2025-10-09T05:05:43","slug":"the-worlds-most-sensitive-computer-code-is-vulnerable-to-attack-a-new-encryption-method-can-help","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/10\/the-worlds-most-sensitive-computer-code-is-vulnerable-to-attack-a-new-encryption-method-can-help","title":{"rendered":"The world\u2019s most sensitive computer code is vulnerable to attack. A new encryption method can help"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/the-worlds-most-sensitive-computer-code-is-vulnerable-to-attack-a-new-encryption-method-can-help2.jpg\"><\/a><\/p>\n<p>Nowadays data breaches aren\u2019t rare shocks\u2014they\u2019re a weekly drumbeat. From leaked customer records to stolen source code, our digital lives keep spilling into the open.<\/p>\n<p>Git services are especially vulnerable to cybersecurity threats. These are online hosting platforms that are widely used in the IT industry to collaboratively develop software, and are home to most of the world\u2019s computer code.<\/p>\n<p>Just last week, hackers <a href=\"https:\/\/www.securityweek.com\/red-hat-confirms-gitlab-instance-hack-data-theft\/\" target=\"_blank\">reportedly<\/a> stole about 570 gigabytes of data from a git service called GitLab. The stolen data was associated with major companies such as IBM and Siemens, as well as United States government organizations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays data breaches aren\u2019t rare shocks\u2014they\u2019re a weekly drumbeat. From leaked customer records to stolen source code, our digital lives keep spilling into the open. Git services are especially vulnerable to cybersecurity threats. These are online hosting platforms that are widely used in the IT industry to collaboratively develop software, and are home to most [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625,1490],"tags":[],"class_list":["post-223121","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption","category-government"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=223121"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223121\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=223121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=223121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=223121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}