NewsNowGamingFeed · @NewsNowGamingFeed
3 followers · 6225 posts · Server mas.to

(GGRecon) How to get pregnant in Maple Hospital
c.newsnow.co.uk/A/1169727716?-
(GGRecon) Everything we know about Counter-Strike 2: CS:GO 2, Source 2, leaks, & more
c.newsnow.co.uk/A/1169727715?-
(Charlie Intel) How to fix error in Modern Warfare 2
c.newsnow.co.uk/A/1169727551?-

#x41

Last updated 2 years ago

In the recent weeks developer ecosystem parts seem be be the weak spot no 1.

And a lot of the events are "published" behind flags to SEO-optimize the Public Relations. "We take security seriously... until it's serious". That's bad practice, and it helps no one. Be transparent about the issues.

* got backdoored (apparently it was a test / dependency confusion attack)
pytorch.org/blog/compromised-n

* - automation holds secrets, compromised via a dev workstation. Customers have to change keys etc.
circleci.com/blog/jan-4-2023-i

* "breach" - they lost their code. Who knows what hardcoded secrets etc. they lost as well.
slack.com/intl/en-au/blog/news

* - part of many JavaScript based stacks. An Authentication Bypass here is a total failure.
security.snyk.io/package/npm/j

* changes the gpg key due to the CircleCI issue. Which is proactive, and well thought of.
docs.datadoghq.com/agent/faq/c

* audited and they found severe vulns. This also affects CI systems, like or Actions in some cases (if the Runner uses Git to build things).
x41-dsec.de/security/research/

What we learn: holistic and Product Security has to look into these "mystical things" like the developer infrastructure, Software Bill Of Materials ( ), Continuous Integration etc. Things 99% of InfoSec professionals have 0 clue about.
In 2023 you should change that, and focus your training efforts there.

#infosec #noindex #pytorch #circleci #slack #jsonwebtoken #oauth #datadog #rpm #x41 #git #jenkins #github #appsec #SBOM

Last updated 3 years ago

has patched two critical severity security vulnerabilities that could allow attackers to execute arbitrary code after successfully exploiting heap-based buffer overflow weaknesses.

Security experts from (Eric Sesterhenn and Markus Vervier) and (Joern Schneeweisz) found these vulnerabilities as part of a security source code audit of Git sponsored by .

bleepingcomputer.com/news/secu

#git #x41 #gitlab #ostif #cybersecurity #infosec #patching #appsec

Last updated 3 years ago