Security Research

A collection of 7 posts

The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of GitGuardian’s data in understanding supply chain attacks.

Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers are unreferenced image layers that continue to exist for weeks in registries, even after being removed from a manifest. In this hands-on deep dive, we explore how these layers can persist in registries and why ensuring the immediate revocation of exposed secrets is critical.

From GitHub Leak to Pwn: A Hacker’s Kill Chain

From GitHub Leak to Pwn: A Hacker’s Kill Chain

Discover how seemingly minor mistakes, like leaking a secret to a non-publicly accessible resource, can lead to a major breach. In this engaging scenario, see how an attacker would chain vulnerabilities to access highly sensitive areas, and learn a valuable lesson along the way.

arrow-down