Attackers don't just guess passwords anymore. They use search engines to hunt...
https://linuxsecurity.com/news/security-trends/search-exposure-linux-security
Attackers don't just guess passwords anymore. They use search engines to hunt for your exposed SSH configs or open Git repositories on GitHub