FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware

By: Newsroom β€” April 10th 2024 at 12:38
Threat actors are now taking advantage of GitHub's search functionality to trick unsuspecting users looking for popular repositories into downloading spurious counterparts that serve malware. The latest assault on the open-source software supply chain involves concealing malicious code within Microsoft Visual Code project files that's designed to download next-stage payloads from a remote URL,
☐ β˜† βœ‡ The Hacker News

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

By: Newsroom β€” March 29th 2024 at 05:37
The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. PyPI said "new project creation and new user registration" was temporarily halted to mitigate what it said was a "malware upload campaign." The incident was resolved 10 hours later, on March 28, 2024, at 12:56
☐ β˜† βœ‡ The Hacker News

GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions

By: THN β€” September 28th 2023 at 17:22
A new deceptive campaign has been observed hijacking GitHub accounts and committing malicious code disguised as Dependabot contributions with an aim to steal passwords from developers. "The malicious code exfiltrates the GitHub project's defined secrets to a malicious C2 server and modify any existing javascript files in the attacked project with a web-form password-stealer malware code
☐ β˜† βœ‡ The Hacker News

Malicious npm Packages Aim to Target Developers for Source Code Theft

By: THN β€” August 30th 2023 at 11:27
An unknown threat actor is leveraging malicious npm packages to target developers with an aim to steal source code and configuration files from victim machines, a sign of how threats lurk consistently in open-source repositories. "The threat actor behind this campaign has been linked to malicious activity dating back to 2021," software supply chain security firm CheckmarxΒ saidΒ in a report shared
☐ β˜† βœ‡ The Hacker News

A Data Exfiltration Attack Scenario: The Porsche Experience

By: The Hacker News β€” July 28th 2023 at 11:48
As part ofΒ Checkmarx's missionΒ to help organizations develop and deploy secure software, the Security Research team started looking at the security posture of major car manufacturers. Porsche has a well-established Vulnerability Reporting Policy (Disclosure Policy)[1], it was considered in scope for our research, so we decided to start there, and see what we could find. What we found is an
☐ β˜† βœ‡ The Hacker News

Banking Sector Targeted in Open-Source Software Supply Chain Attacks

By: THN β€” July 24th 2023 at 07:24
Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the banking sector. "These attacks showcased advanced techniques, including targeting specific components in web assets of the victim bank by attaching malicious functionalities to it," CheckmarxΒ saidΒ in a report published last week. "The attackers
☐ β˜† βœ‡ The Hacker News

Secrets, Secrets Are No Fun. Secrets, Secrets (Stored in Plain Text Files) Hurt Someone

By: The Hacker News β€” July 5th 2023 at 10:46
Secrets are meant to be hidden or, at the very least, only known to a specific and limited set of individuals (or systems). Otherwise, they aren't really secrets. In personal life, a secret revealed can damage relationships, lead to social stigma, or, at the very least, be embarrassing. In a developer's or application security engineer's professional life, the consequences of exposing secrets
☐ β˜† βœ‡ The Hacker News

Introducing AI-guided Remediation for IaC Security / KICS

By: The Hacker News β€” June 19th 2023 at 11:51
While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices, the speed and flexibility that IaC provides can also introduce the potential for misconfigurations and security vulnerabilities.Β  IaC allows organizations to define and manage their infrastructure using machine-readable configuration files, which are
☐ β˜† βœ‡ The Hacker News

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

By: The Hacker News β€” May 24th 2023 at 10:51
If you're involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST) solutions are an important part of a comprehensive application security strategy. SAST secures software, supports business more securely, cuts down on costs, reduces risk, and speeds time to development, delivery, and deployment of mission-critical
☐ β˜† βœ‡ The Hacker News

Hackers Flood NPM with Bogus Packages Causing a DoS Attack

By: Ravie Lakshmanan β€” April 10th 2023 at 12:45
Threat actors flooded the npm open source package repository for Node.js with bogus packages that briefly even resulted in a denial-of-service (DoS) attack. "The threat actors create malicious websites and publish empty packages with links to those malicious websites, taking advantage of open-source ecosystems' good reputation on search engines," Checkmarx's Jossef Harush KadouriΒ saidΒ in a
❌