Building resilient and secure systems - Lessons from Devoxx Poland
Devoxx Poland is a developer first confrence that invites software innovators from around the world present latest trends in the industry, here are some of the key takeaways to build secure and resilient systems.
Lessons from Lapsus - CISO on Building a comprehensive secrets management program
Following a breach by the Lapsus$ cyber gang, Jason Haddix, then CISO of UbiSoft called over 40 other CISOs to discuss strategies on how to be more resilient to attacks. Those conversations led him to create a 4 step guide to building a comprehensive secrets management program.
Why ChatGPT is a security concern for your organization (even if you don't use it)
ChatGPT may not be used by all organizations and may even be banned. But that doesn't mean you don't have exposure to the security risks it contains. This post looks at why ChatGPT should be part of your threat landscape.
Best Practices for Managing and Storing Secrets Including API Keys and Other Credentials [cheat sheet included]
We have compiled a list of some of the best practices to prevent API key leakage and keep secrets and credentials safe. Secrets management doesn’t have a one-size-fits-all approach, so this list considers multiple perspectives so you can be informed in deciding to or not to implement strategies.
Using GGCanary to Create Your Own Honeytokens with Open Source Tools - Complete Tutorial
Honeytokens or Canary Tokens are credentials designed to alert you when an attacker is in your infrastructure. This is a complete tutorial how to create them using only open-source projects.
Exposing secrets on GitHub: What to do after leaking credentials and API keys
If you have discovered that you have just exposed a sensitive file or secrets to a public git repository, there are some very important steps to follow.
The State of Security in Australia: HackSydney and BSides give insight into security post-Medibank and Optus
Cybersecurity in Australia has moved well and truly into the focus of the mainstream media and the everyday public. This year we saw two catastrophic security breaches with Optus, an Australian telecom provider, and Medibank, one of the largest health insurance providers in Australia.
Millions of .git folders exposed publicly by mistake
New research by CyberNews has revealed that there are millions of private git repositories that are, in fact, not all that private.
Dropbox Suffers Data Breach From Phishing Attack, Exposing Customer and Employee Emails
Dropbox has confirmed they suffered a data breach involving a bad actor gaining access to credentials, data, and other secrets inside their internal GitHub code repositories.
Poisoning the source – How and why attackers are targeting developer accounts
This year at DEFCON and Black Hat—the world's largest security and hacking conferences—many talks focused on how attackers target developers' accounts. Here are the key points.
Uber Breach 2022 – Everything You Need to Know
On Thursday, September 15th, Uber confirmed reports of an organization-wide cybersecurity breach. This is an evolving situation, but we will bring you here the latest information and commentary as we get it.