Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • System Design Series: Apache Flink from 10,000 Feet, and Building a Flink-powered Recommendation Engine
    • 15-second semicylinder air tent unboxes from the cube
    • Emergency First Responders Say Waymos Are Getting Worse
    • Motorola Razr Fold vs. Samsung Galaxy Z Fold 7: How the Book-Style Phones Compare
    • Agentic AI: How to Save on Tokens
    • Lightweight ebike conversion kit electrifies your bike
    • Taylor Swift Wants to Trademark Her Likeness. These TikTok Deepfake Ads Show Why
    • New Releases on Prime Video in May 2026: Jack Reacher, Spider-Noir and More
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, April 30
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Large enterprises scramble after supply-chain attack spills their secrets
    News

    Large enterprises scramble after supply-chain attack spills their secrets

    Editor Times FeaturedBy Editor Times FeaturedMarch 17, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Open supply software program utilized by greater than 23,000 organizations, a few of them in giant enterprises, was compromised with credential-stealing code after attackers gained unauthorized entry to a maintainer account, within the newest open supply supply-chain assault to roil the Web.

    The corrupted package deal, tj-actions/changed-files, is a part of tj-actions, a group of information that is utilized by greater than 23,000 organizations. Tj-actions is one in all many GitHub Actions, a type of platform for streamlining software program out there on the open supply developer platform. Actions are a core technique of implementing what’s generally known as CI/CD, quick for Steady Integration and Steady Deployment (or Steady Supply).

    Scraping server reminiscence at scale

    On Friday or earlier, the supply code for all variations of tj-actions/changed-files acquired unauthorized updates that modified the “tags” builders use to reference particular code variations. The tags pointed to a publicly out there file that copies the inner reminiscence of severs operating it, searches for credentials, and writes them to a log. Within the aftermath, many publicly accessible repositories operating tj-actions ended up displaying their most delicate credentials in logs anybody might view.

    “The scary a part of actions is that they’ll typically modify the supply code of the repository that’s utilizing them and entry any secret variables related to a workflow,” HD Moore, founder and CEO of runZero and an knowledgeable in open supply safety, mentioned in an interview. “Probably the most paranoid use of actions is to audit all the supply code, then pin the precise commit hash as a substitute of the tag into the … the workflow, however this can be a trouble.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

    April 29, 2026

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Alberta online gambling expansion sparks concern among First Nations casino operators

    April 29, 2026

    Better Markets urges courts to let states regulate prediction markets, not CFTC

    April 29, 2026

    Q&A with Sam Altman and AWS CEO Matt Garman about OpenAI’s new partnership with AWS, Bedrock Managed Agents, Trainium chips, and more (Ben Thompson/Stratechery)

    April 28, 2026

    Snapchat launches AI Sponsored Snaps, a conversational ad format in the Chat tab that lets users talk to brand-specific AI agents for product recommendations (Aisha Malik/TechCrunch)

    April 28, 2026

    Comments are closed.

    Editors Picks

    System Design Series: Apache Flink from 10,000 Feet, and Building a Flink-powered Recommendation Engine

    April 30, 2026

    15-second semicylinder air tent unboxes from the cube

    April 30, 2026

    Emergency First Responders Say Waymos Are Getting Worse

    April 29, 2026

    Motorola Razr Fold vs. Samsung Galaxy Z Fold 7: How the Book-Style Phones Compare

    April 29, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Time to Save Up: iPhone 17 Pro Price Hike Appears Imminent, Says New Report

    August 29, 2025

    Startmate’s heading back to Silicon Valley with its founders

    March 12, 2026

    Kids and Teen Influencers in Australia Say ‘Bye-Bye’ to Social Media

    December 10, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.