Which of the following is a common source of unintentional corporate credential leakage in cloud environments?
A. Code repositories
B. Dark web
C. Threat feeds
D. State actors
E. Vulnerability databases
A. Code repositories
B. Dark web
C. Threat feeds
D. State actors
E. Vulnerability databases