{"version":"1.0","provider_name":"CyberGuard 6 Blog","provider_url":"https:\/\/www.cyberguard6.com\/blog","title":"TruffleHog Malware: When a Defensive Tool Gets Weaponized - CyberGuard 6 Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Rt3nRPfEeV\"><a href=\"https:\/\/www.cyberguard6.com\/blog\/trufflehog-malware-when-a-defensive-tool-gets-weaponized\/\">TruffleHog Malware: When a Defensive Tool Gets Weaponized<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberguard6.com\/blog\/trufflehog-malware-when-a-defensive-tool-gets-weaponized\/embed\/#?secret=Rt3nRPfEeV\" width=\"600\" height=\"338\" title=\"&#8220;TruffleHog Malware: When a Defensive Tool Gets Weaponized&#8221; &#8212; CyberGuard 6 Blog\" data-secret=\"Rt3nRPfEeV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberguard6.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"How legitimate secrets-scanning technology shows up in real intrusions\u2014and what to do about it. &nbsp; Security tools don\u2019t magically become \u201cgood\u201d or \u201cbad\u201d based on what they\u2019re called. What matters is who is running them, where they\u2019re running them, and what they do next. TruffleHog is a legitimate secrets-scanning tool used by defenders to find&hellip; Continue reading Untitled"}