Security News > 2017 > August > Hackers Can Use Git Repos for Stealthy Attack on Developers (Security Week)
![Hackers Can Use Git Repos for Stealthy Attack on Developers (Security Week)](/static/build/img/news/alt/hackers-statistics-medium.jpg)
2017-08-04 08:48
Malicious actors can abuse GitHub and other services that host Git repositories for stealthy attacks aimed at software developers, experts showed recently at the Black Hat security conference in Las Vegas. read more
News URL
Related news
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Time for a change: Elevating developers’ security skills (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Balancing usability and security in the fight against identity-based attacks (source)
- Trump 'waved a white flag to Chinese hackers' as Homeland Security axed cyber advisory boards (source)
- Clone2Leak attacks exploit Git flaws to steal credentials (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)