Close Menu
Global News HQ
    What's Hot

    Nintendo has huge discounts on Switch 2 games in its holiday sale

    December 23, 2025

    Top 5 Content Marketing Strategy Examples

    December 23, 2025

    How Davis Polk Has Become Go-To Merger Counsel for Big Law| Law.com

    December 23, 2025
    Recent Posts
    • Nintendo has huge discounts on Switch 2 games in its holiday sale
    • Top 5 Content Marketing Strategy Examples
    • How Davis Polk Has Become Go-To Merger Counsel for Big Law| Law.com
    • Stocks Rise to the Spirit of the Season: Stock Market Today
    • Naeem Khan Pre-Fall 2026 Collection
    Facebook X (Twitter) Instagram YouTube TikTok
    Trending
    • Nintendo has huge discounts on Switch 2 games in its holiday sale
    • Top 5 Content Marketing Strategy Examples
    • How Davis Polk Has Become Go-To Merger Counsel for Big Law| Law.com
    • Stocks Rise to the Spirit of the Season: Stock Market Today
    • Naeem Khan Pre-Fall 2026 Collection
    • The Biggest Bitcoin and Crypto Treasury Plays of 2025 – Decrypt
    • We Asked Designers What Makes a Kitchen Look Empty and We Wish We Knew This Sooner
    • What it was like on Amtrak’s new Acela ‘NexGen’ trains – The Points Guy
    Global News HQ
    • Technology & Gadgets
    • Travel & Tourism (Luxury)
    • Health & Wellness (Specialized)
    • Home Improvement & Remodeling
    • Luxury Goods & Services
    • Home
    • Finance & Investment
    • Insurance
    • Legal
    • Real Estate
    • More
      • Cryptocurrency & Blockchain
      • E-commerce & Retail
      • Business & Entrepreneurship
      • Automotive (Car Deals & Maintenance)
    Global News HQ
    Home - Technology & Gadgets - Large enterprises scramble after supply-chain attack spills their secrets
    Technology & Gadgets

    Large enterprises scramble after supply-chain attack spills their secrets

    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Large enterprises scramble after supply-chain attack spills their secrets
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Open-source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with credential-stealing code after attackers gained unauthorized access to a maintainer account, in the latest open-source supply-chain attack to roil the Internet.

    The corrupted package, tj-actions/changed-files, is part of tj-actions, a collection of files that’s used by more than 23,000 organizations. Tj-actions is one of many Github Actions, a form of platform for streamlining software available on the open-source developer platform. Actions are a core means of implementing what’s known as CI/CD, short for Continuous Integration and Continuous Deployment (or Continuous Delivery).

    Scraping server memory at scale

    On Friday or earlier, the source code for all versions of tj-actions/changed-files received unauthorized updates that changed the “tags” developers use to reference specific code versions. The tags pointed to a publicly available file that copies the internal memory of severs running it, searches for credentials, and writes them to a log. In the aftermath, many publicly accessible repositories running tj-actions ended up displaying their most sensitive credentials in logs anyone could view.

    “The scary part of actions is that they can often modify the source code of the repository that is using them and access any secret variables associated with a workflow,” HD Moore, founder and CEO of runZero and an expert in open-source security, said in an interview. “The most paranoid use of actions is to audit all of the source code, then pin the specific commit hash instead of the tag into the … the workflow, but this is a hassle.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleRidley Scott’s Newest Opus? His French Wine.
    Next Article OKX suspends DEX aggregator to stop ‘further misuse’ by Lazarus

    Related Posts

    Nintendo has huge discounts on Switch 2 games in its holiday sale

    December 23, 2025

    Don't Let Airbnb Owners Spy on You. Here's How to Spot Hidden Cameras in Your Rental

    December 22, 2025

    Samsung ‘Wide Fold’ rumored to rival Apple’s foldable next year

    December 22, 2025

    Mali vs. Zambia 2025 livestream: Watch Africa Cup of Nations for free

    December 22, 2025
    Leave A Reply Cancel Reply

    ads
    Don't Miss
    Technology & Gadgets
    2 Mins Read

    Nintendo has huge discounts on Switch 2 games in its holiday sale

    Nintendo is in a giving state of mind this season, offering some holiday deals on…

    Top 5 Content Marketing Strategy Examples

    December 23, 2025

    How Davis Polk Has Become Go-To Merger Counsel for Big Law| Law.com

    December 23, 2025

    Stocks Rise to the Spirit of the Season: Stock Market Today

    December 23, 2025
    Top
    Technology & Gadgets
    2 Mins Read

    Nintendo has huge discounts on Switch 2 games in its holiday sale

    Nintendo is in a giving state of mind this season, offering some holiday deals on…

    Top 5 Content Marketing Strategy Examples

    December 23, 2025

    How Davis Polk Has Become Go-To Merger Counsel for Big Law| Law.com

    December 23, 2025
    Our Picks
    Technology & Gadgets
    2 Mins Read

    Nintendo has huge discounts on Switch 2 games in its holiday sale

    Nintendo is in a giving state of mind this season, offering some holiday deals on…

    Business & Entrepreneurship
    6 Mins Read

    Top 5 Content Marketing Strategy Examples

    Content marketing strategies play a vital role in how brands communicate with their audiences. By…

    Pages
    • About Us
    • Contact Us
    • Disclaimer
    • Homepage
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube TikTok
    • Home
    © 2025 Global News HQ .

    Type above and press Enter to search. Press Esc to cancel.

    Go to mobile version