Security News

Checkmarx provides automated security scans within GitHub repositories
2020-10-05 14:11

Checkmarx announced a new GitHub Action to bring comprehensive, automated static and open source security testing to developers. Checkmarx's new GitHub Action integrates the company's application security testing solutions - Checkmarx SAST and Checkmarx SCA - directly with GitHub code scanning, giving developers more flexibility and power to work with their preferred tools of choice to secure proprietary and open source code.

GitHub Announces General Availability of Code Scanning Feature
2020-09-30 18:05

GitHub on Wednesday announced that its code scanning feature, which is designed to enable developers to easily identify vulnerabilities in their products before they reach production, is generally available. The code scanning feature was unveiled in May, but at the time it was still in beta.

ShiftLeft NG SAST now available on GitHub Marketplace
2020-09-10 00:30

Now available as a free GitHub App, NG SAST enables code analysis to be integrated into developer workflows in just a few clicks. Now that NG SAST is available through GitHub Marketplace, developers can make their own choices about which tools they adopt.

Medical Data Leaked on GitHub Due to Developer Errors
2020-08-26 13:49

Ursem, self-appointed "Lamest hacker you know" found the leaked info in a simple search to see if someone "Is actually stupid enough to upload medical customer data to GitHub," he told DataBreach.net. The report describes one errant developer referred to as the "Typhoid Mary of Data Leaks" because of the multiple errors and repetition of these errors in his use of GitHub in relation to not just storage and management of medical data, but other files as well.

PoC Exploit Targeting Apache Struts Surfaces on GitHub
2020-08-14 21:20

Proof-of-concept exploit code surfaced on GitHub on Friday, raising the stakes on two existing Apache Struts 2 bugs that allow for remote code-execution and denial-of-service attacks on vulnerable installations. Remediation includes upgrading to Struts 2.5.22, according to the Apache Struts Security Team.

Solar appScreener 3.6: Supporting Pascal and integrating with GitLab, GitHub and Bitbucket
2020-08-13 00:00

Solar Security has announced the release of a new version of its app security analyzer, Solar appScreener 3.6, which supports Pascal and features improved integration with GitLab, GitHub and Bitbucket code version management and storage systems. To meet international customers' needs, the new version of our app vulnerability and undocumented feature analyzer, Solar appScreener 3.6, now supports Pascal.

NCC Group admits its training data was leaked online after folders full of CREST pentest certification exam notes posted to GitHub
2020-08-11 14:58

British infosec biz NCC Group has admitted to The Register that its internal training materials were leaked on GitHub - after folders purporting to help people pass the CREST pentest certification exams appeared in a couple of repositories. CREST offers a certification called CRT: CREST Registered Tester.

DeepSource Says Hackers Compromised Its GitHub Application
2020-07-22 12:14

Automated code review tool provider DeepSource this week announced that it reset tokens, secrets, private keys, and employee credentials after being informed that its GitHub application was compromised. Designed to help developers identify security flaws, bug risks, and performance issues during code review, DeepSource also provides integration with GitHub to allow app authors get started with code analysis fast.

Octopus Scanner Sinks Tentacles into GitHub Repositories
2020-06-02 15:32

The Octopus Scanner malware, which targets the Apache NetBeans Java integrated development environment, has been nesting in at least 26 GitHub source-code repositories, according to researchers - waiting to take over developer machines. Once a developer does so, Octopus Scanner unfurls itself, first scanning the developer's computer for the presence of NetBeans.

Github uncovers malicious ‘Octopus Scanner’ targeting developers
2020-06-01 10:28

In its write-up of the attack, the GitHub Security Labs team explains how the malware lurks in source code repositories uploaded to its site, activating when a developer downloads an infected repository and uses it to create a software program. Most of the variants that GitHub found in its scans also infect a project's source code, meaning that any other newly-infected projects mirrored to remote repositories would spread the malware further on GitHub.