Close Menu
Global News HQ
    What's Hot

    The simple gear Naomi Hearts uses to create TikTok magic

    June 22, 2025

    Think Crypto is Used for Illegal Activities? Read This Report First

    June 22, 2025

    Go Inside Dorit Kemsley’s Sweet Reunion With Her Parents (PHOTOS) | Bravo

    June 22, 2025
    Recent Posts
    • The simple gear Naomi Hearts uses to create TikTok magic
    • Think Crypto is Used for Illegal Activities? Read This Report First
    • Go Inside Dorit Kemsley’s Sweet Reunion With Her Parents (PHOTOS) | Bravo
    • 1 Stock That Turned $1,000 Into More Than $1 Million | The Motley Fool
    • XRP Daily RSI Trendline Breaks Down – What It Means For Price
    Facebook X (Twitter) Instagram YouTube TikTok
    Trending
    • The simple gear Naomi Hearts uses to create TikTok magic
    • Think Crypto is Used for Illegal Activities? Read This Report First
    • Go Inside Dorit Kemsley’s Sweet Reunion With Her Parents (PHOTOS) | Bravo
    • 1 Stock That Turned $1,000 Into More Than $1 Million | The Motley Fool
    • XRP Daily RSI Trendline Breaks Down – What It Means For Price
    • This AI-Generated Laundry Detergent for the Neurodivergent Market Demonstrates the Democratization of Disruption
    • Greek man gets 5 years in prison for running a now-defunct torrenting site 10 years ago — Greece goes tough on torrenting
    • Lukashenko frees Belarusian opposition leader after meeting Trump envoy
    Global News HQ
    • Technology & Gadgets
    • Travel & Tourism (Luxury)
    • Health & Wellness (Specialized)
    • Home Improvement & Remodeling
    • Luxury Goods & Services
    • Home
    • Finance & Investment
    • Insurance
    • Legal
    • Real Estate
    • More
      • Cryptocurrency & Blockchain
      • E-commerce & Retail
      • Business & Entrepreneurship
      • Automotive (Car Deals & Maintenance)
    Global News HQ
    Home - Technology & Gadgets - Large enterprises scramble after supply-chain attack spills their secrets
    Technology & Gadgets

    Large enterprises scramble after supply-chain attack spills their secrets

    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Large enterprises scramble after supply-chain attack spills their secrets
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Open-source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with credential-stealing code after attackers gained unauthorized access to a maintainer account, in the latest open-source supply-chain attack to roil the Internet.

    The corrupted package, tj-actions/changed-files, is part of tj-actions, a collection of files that’s used by more than 23,000 organizations. Tj-actions is one of many Github Actions, a form of platform for streamlining software available on the open-source developer platform. Actions are a core means of implementing what’s known as CI/CD, short for Continuous Integration and Continuous Deployment (or Continuous Delivery).

    Scraping server memory at scale

    On Friday or earlier, the source code for all versions of tj-actions/changed-files received unauthorized updates that changed the “tags” developers use to reference specific code versions. The tags pointed to a publicly available file that copies the internal memory of severs running it, searches for credentials, and writes them to a log. In the aftermath, many publicly accessible repositories running tj-actions ended up displaying their most sensitive credentials in logs anyone could view.

    “The scary part of actions is that they can often modify the source code of the repository that is using them and access any secret variables associated with a workflow,” HD Moore, founder and CEO of runZero and an expert in open-source security, said in an interview. “The most paranoid use of actions is to audit all of the source code, then pin the specific commit hash instead of the tag into the … the workflow, but this is a hassle.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleRidley Scott’s Newest Opus? His French Wine.
    Next Article OKX suspends DEX aggregator to stop ‘further misuse’ by Lazarus

    Related Posts

    The simple gear Naomi Hearts uses to create TikTok magic

    June 22, 2025

    Greek man gets 5 years in prison for running a now-defunct torrenting site 10 years ago — Greece goes tough on torrenting

    June 21, 2025

    How a data center company uses stranded renewable energy

    June 21, 2025

    ChatGPT can now sum up your meetings – here's how to use it (and who can)

    June 21, 2025
    Leave A Reply Cancel Reply

    ads
    Don't Miss
    Technology & Gadgets
    2 Mins Read

    The simple gear Naomi Hearts uses to create TikTok magic

    You might know Naomi Hearts from her hilarious comedy skits, her mouthwatering food videos, or…

    Think Crypto is Used for Illegal Activities? Read This Report First

    June 22, 2025

    Go Inside Dorit Kemsley’s Sweet Reunion With Her Parents (PHOTOS) | Bravo

    June 22, 2025

    1 Stock That Turned $1,000 Into More Than $1 Million | The Motley Fool

    June 22, 2025
    Top
    Technology & Gadgets
    2 Mins Read

    The simple gear Naomi Hearts uses to create TikTok magic

    You might know Naomi Hearts from her hilarious comedy skits, her mouthwatering food videos, or…

    Think Crypto is Used for Illegal Activities? Read This Report First

    June 22, 2025

    Go Inside Dorit Kemsley’s Sweet Reunion With Her Parents (PHOTOS) | Bravo

    June 22, 2025
    Our Picks
    Technology & Gadgets
    2 Mins Read

    The simple gear Naomi Hearts uses to create TikTok magic

    You might know Naomi Hearts from her hilarious comedy skits, her mouthwatering food videos, or…

    Cryptocurrency & Blockchain
    3 Mins Read

    Think Crypto is Used for Illegal Activities? Read This Report First

    Cryptocurrency crime may be evolving, but the share of illicit such transactions remains strikingly small.…

    Pages
    • About Us
    • Contact Us
    • Disclaimer
    • Homepage
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube TikTok
    • Home
    © 2025 Global News HQ .

    Type above and press Enter to search. Press Esc to cancel.

    Go to mobile version