Remove tag ci-cd-security
article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. As the premier platform for hosting open-source projects, GitHub’s popularity has boosted the popularity of its CI/CD platform — GitHub Actions. Reference a tag. Reference a commit hash.

Malware 144
article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

Attackers may attempt to compromise the third-party GitHub action — via command injection in its CI workflow, repojacking or theft of a developer’s credentials — and push malicious code to the action. Figure 1: GitHub Actions workflow consumes a secure, pinned version of a third-party action.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s New in FlexDeploy 6.0

Flexagon

We have recently published a number of blogs on these new features, but you may be wondering what else is new and coming with FlexDeploy 6.0. Access recent, indicate favorites for quicker access, and tag several types of objects and search by tag. Software Supply Chain Security. Learn more about Supply Chain Security.

UI/UX 78
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Introduction Welcome to part two of the Application Security Testing series. Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. DAST tests the security of an application by scanning it at runtime.

article thumbnail

Our Latest Open Source Innovation, Yor: Automated IaC Tag and Trace

Palo Alto Networks

While sitting in a security operations center (SOC) in the middle of a high-severity incident, you realize Secure Shell Protocol (SSH) (port 22) is open to the world. To make that process easier to navigate, many organizations leverage cloud tagging as a scalable way to attribute cloud resources to organizational owners.

article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cyberattacks – and that’s what this blog is about. Today we’re sharing our experience adopting the supply-chain security framework SLSA, with the hopes that the lessons we learned will be helpful to you. What is SLSA?

article thumbnail

You are what you Git: how your VCS branching model affects your delivery cadence

CircleCI

Use one or more branches or tags for different levels of production-readiness, hotfixes, etc. Author: Vincent Driessen Original blog post. Our model synergizes extremely well with CI/CD best-practices. For the purposes of this post, I’ll simplify it as: Use one branch for development work. How you can do it.