Attackers don't just guess passwords anymore. They use search engines to hunt...
https://telegra.ph/How-Does-Spear-Phishing-Get-So-Believable-The-OSINT-Pipeline-03-22
Attackers don't just guess passwords anymore. They use search engines to hunt for your exposed SSH configs or open Git repositories on GitHub