Comment Security Hardware (Score 2) 38
"Our credential scanning methods did not detect its presence (this issue has been corrected)."
Scanning binary blobs for sensitive information will always be a heuristic prone to false negatives and false positives. It's a good tactic but not the right solution to this problem. The real bug here is that they were using what seems like a very sensitive signing key held in memory, rather than a one held in a Hardware Security Module (HSM). That key should have been created in the HSM and done all it's signing from within the HSM. It should never have been in main memory to being with.