Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: commits Clear Filter

Sequoia backs Zed

Nathan Sobo August 20th, 2025 Today we're announcing our $32M Series B led by Sequoia Capital with participation from our existing investors, bringing our total funding to over $42M. For the past four years, we've been building the world's fastest IDE, but that's just the foundation for what comes next. Our ultimate vision is a new way to collaborate on software, where conversations about code remain connected to the code itself, instead of being tied to aging snapshots or scattered across dif

Sequoia Backs Zed's Vision for Collaborative Coding

Nathan Sobo August 20th, 2025 Today we're announcing our $32M Series B led by Sequoia Capital with participation from our existing investors, bringing our total funding to over $42M. For the past four years, we've been building the world's fastest IDE, but that's just the foundation for what comes next. Our ultimate vision is a new way to collaborate on software, where conversations about code remain connected to the code itself, instead of being tied to aging snapshots or scattered across dif

How to Scan Force Pushed Commits for Secrets

Key Insights The new Force Push Scanner tool scans for secrets in dangling commits on GitHub that remain exposed after certain force push operations. Run the following command to scan your GitHub repositories: python force_push_scanner . py -- db - file pushes . sqlite3 -- scan < github_org / user Zero-Commit Force Push operations: where developers attempt to erase mistakes by resetting their git history without pushing new commits. There are tens of millions of dangling commits publicly acc

I scanned all of GitHub's "oops commits" for leaked secrets

TL;DR GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents . I scanned every force push event since 2020 and uncovered secrets worth $25k in bug bounties. Together with Truffle Security, we're open sourcing a new tool to scan your own GitHub organization for