DATA SECURITY, SOFTWARE SECURITY, WEB SECURITY TOOLS

Legit Security Discovers and Helps Remediate Software Supply Chain Vulnerabilities in Google Firebase & Apache Open-Source Projects

Legit Security | September 16, 2022 | Read time : 02:50 min

Legit Security
Legit Security, a cyber security company with an enterprise platform to secure an organization’s software supply chain, today announced that it discovered software supply chain attack vulnerabilities in popular open-source projects from Google and Apache. The discovered vulnerability affects GitHub, an extremely popular Source Code Management (SCM) system at the heart of many organization’s software supply chains and used by software developers globally. The Legit Security research team found a new type of CI/CD vulnerability called “GitHub Environment Injection” that allows attackers to take control of the vulnerable project's GitHub Actions CI/CD pipeline. Any GitHub user could exploit this vulnerability to modify the project’s source code, steal secrets, move laterally and attack inside the organization, and ultimately initiate a SolarWinds-like supply chain attack. The vulnerability was found in the Google Firebase project and in a very popular integration framework project from Apache. Both Google and Apache acknowledged and fixed the vulnerabilities after an initial disclosure by Legit Security. Legit Security has published a technical disclosure blog on their website including guidance for organizations to remediate this vulnerability.

Legit Security’s Research Team discovered that a specially crafted payload written to a GitHub environment variable called “GITHUB_ENV” could allow an attacker to execute code on the target pipeline and thereby modify the source code or compromise the repository itself. This attack can be initiated by any GitHub user and is very easy to implement just by creating a “pull request” or a proposed change to the source code. The mere act of submitting the pull request will trigger the vulnerable build action and carry out a successful compromise and the attacker does not need to be subjected a code review approval from the source code maintainer for it to take effect.

The Legit Security team disclosed these issues to Google and Apache project maintainers, along with remediation guidelines, and verified that these vulnerabilities weren’t exploited by a malicious actor. Both projects have been fixed and are now safe. However, these are not the only projects susceptible to this kind of attack. Since using the GITHUB_ENV file is currently considered the “safe” way to change environment variables in GitHub Actions, many repositories are using workflows that write untrusted data into this file, leaving them exposed to supply chain attacks.

“This type of vulnerability joins many other software supply chain vulnerabilities and attacks targeting popular open-source projects, including GitHub, which is the largest and the de facto host of most open-source projects. “We, as a security community, must build the tools and processes to address these threats and allow organizations to trust software and use it safely. Here at Legit Security our mission is to secure every organization’s software supply chain and we are active conducting security research and collaborating on initiatives to achieve this goal."

Liav Caspi, CTO and co-founder of Legit Security

According to Gartner®, nearly half of organizations worldwide will experience an attack on their software supply chains by 2025, a three-fold increase from 2021. There has been a huge rise in attempts to compromise open-source projects and CI/CD build services, including GitHub Actions, to enable wide ranging attacks through software supply chains.

For in-depth analysis of the GitHub Environment Injection vulnerability, along with broader information and guidance on how to protect your organization from software supply chain attacks, please visit the Legit Security website and blog.

About Legit Security
Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Legit provides an easy to implement SaaS platform that supports both cloud and on-premises resources and combines automated discovery and analysis capabilities with hundreds of security policies developed by industry experts with real-world SDLC security experience. This integrated platform keeps your software factory secure and provides continuous assurance that your applications are released without vulnerabilities.

Spotlight

Malwarebytes engaged Osterman Research to undertake an in-depth survey of security professionals in five countries. The goal of the research was to understand the organizational costs associated with cybercriminal activity, and to understand what motivates some security professionals to join the “dark side” – i.e., to become either “gray hats”, who participate in criminal activity while also working as legitimate security professionals; or full-fledged “black hats” who operate solely within the realm of the cybercriminal underworld.


Other News
DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

IronYun® Announces Integration with Genetec™ Security Center Designed For Comprehensive Visual Intelligence

IronYun | November 01, 2022

IronYun Inc., a leader in AI vision for security, safety and operational applications, today announced the integration of the award winning Vaidio AI Vision Platform with Genetec™ Security Center. Genetec customers can now add advanced, accurate, and field-proven AI video analytics to their existing infrastructure, to improve security, safety, and operational efficiency. "Integrating Vaidio with Security Center makes it easy to add advanced artificial intelligence to existing infrastructure to increase functionality and make security operations even more effective and efficient." Paul Sun, IronYun CEO With the ability to analyze video from Security Center and to seamlessly feed alerts and notifications into the Security Center interface, the Vaidio AI Vision Platform continues to build on an award-winning foundation. Vaidio won the 2020 New Product Showcase for Commercial Monitoring and received two New Product Showcase Awards in 2021 for Mobile Applications and Video Analytics. Also in 2021, IronYun partnered with DP World and Verizon to study Vaidio AI Vision in port and warehouse safety and operational applications. In addition, IronYun was recognized as a Major Player in IDC's Worldwide Video Analytics MarketScape as "a good decision for enterprises that have extensive video surveillance capabilities and want to upgrade to advanced analytics that incorporate the latest technology." The Vaidio AI Vision Platform is an open software platform that can be deployed on-prem on servers, on edge devices, and/or in the cloud. Vaidio orchestrates multiple next-generation AI video analytics engines to provide such functions as video search, intrusion detection, license plate recognition, face search and recognition, people and vehicle counting, vehicle make and model recognition, social health analytics, and many others. Vaidio works with any IP camera and integrates out of the box with Genetec Security Center. Vaidio AI monitors real-time video streams with superhuman accuracy, and accelerates forensic video search of stored video. The platform offers the flexibility to purchase only needed analytics, with the option to run multiple analytics on a single camera, and to add more analytic functionality over time. Vaidio's optimized, next-generation AI vision algorithms maximize hardware resource efficiency, to effectively lower overall solution costs relative to competitive alternatives. The latest Vaidio releases add new AI-enabled safety detection, privacy blurring and associated data and user management features, a fully featured parking management application, (the first 3rd party application developed on the Vaidio platform), Vaidio Data, a robust business intelligence engine, and Vaidio Command Center, for centralized management of complex, distributed, large scale environments. About Vaidio The Vaidio AI Vision Platform offers 30 AI -enabled next-generation video analytics functions for security, safety, access control and operational applications. Vaidio is an open platform that works with any IP camera, scales from 1 to 1,000s of cameras, and integrates with market leading VMSs for real-time, forensic and holistic situational awareness. The Vaidio Platform is differentiated by higher accuracy and greater resource efficiency across a vast array of advanced AI-enabled video analytics. Relative to competitive alternatives, Vaidio can reduce hardware requirements up to 80%, and false alerts up to 99.995% -- reducing both up front and long-term operating costs. About IronYun IronYun has evolved the artificial intelligence at the core of the Vaidio Platform to create a resource-efficient, open platform that is field-proven to maximize accuracy and performance across the industry's broadest array of analytics functions. We are NDAA approved, headquartered in Stamford, CT, and our Vaidio Platform is deployed across tens of thousands of cameras for government, healthcare, education, retail, transit and enterprise customers worldwide.

Read More

DATA SECURITY, SOFTWARE SECURITY

Quad9 Joins the Cyber Threat Alliance as Leading DNS Service to Improve the Cybersecurity of Our Global Digital Ecosystem

Quad9 | September 22, 2022

Today, Quad9, the leading free recursive DNS service, has joined the Cyber Threat Alliance (CTA) [cyberthreatalliance.org], a global non-profit working to improve the cybersecurity of our global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among organizations. Quad9 is part of the Contributing Allies program, which involves collaboration on cyber incidents and key cybersecurity topics. Exchange of expertise and threat intelligence with partners within the Cyber Threat Alliance is indispensable to counter online threats like malware, phishing, identity theft and ransomware. "As we expand our global reach, Quad9 is committed to working together with other cybersecurity providers through strategic partnerships and alliances. "Joining CTA's Contributing Allies program certainly fits that goal and enables us to engage more frequently with other like-minded organizations as we work together to improve security and privacy for all." John Todd, General Manager for Quad9 The Domain Name System (DNS) is where malicious domain names can be blocked most effectively preventing users from getting robbed of their money, identity or data. Over the past six years, Quad9 has built its strength developing the best-in-class maximum security and 100% privacy-assured DNS service. In so doing Quad9 has secured its place as one of the most important free cybersecurity providers in the world; protecting many tens of millions of users with servers in almost 100 countries. "We're excited to have Quad9 as a Contributing Ally," said Michael Daniel, President and CEO of the Cyber Threat Alliance. "They provide great security services and have some unique insights into the flow of data across the Internet. We look forward to working with them to continue improving the security of our digital ecosystem." Anyone who wants to boost their privacy and security can configure their device to use Quad9's DNS service, which blocks more than 150 million malicious events each day. Quad9's services are available to both individuals and organizations. About Quad9 Quad9 is a recursive DNS service providing cybersecurity protection against malware and phishing. Quad9 is a Swiss public-benefit foundation which exists for the purpose of improving privacy and security, Quad9 does not collect or resell personal data. Its service is provided to individuals and organizations at no cost and requires no contract. The organization was launched in 2017 and now operates from nearly two hundred locations in ninety countries. Quad9 exists to improve end user protection and privacy worldwide in addition to promoting the stability and security of the Internet.

Read More

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

OpenText Teams with NetScaler to Deliver Advanced Web Application Protection

OpenText | October 13, 2022

OpenText™ , today announced the integration of its BrightCloud Threat Intelligence with NetScaler Application Delivery Controller (ADC). The move will provide NetScaler customers with contextual insights and automatically protect against malicious IP addresses to improve their resilience in managing the latest security threats. NetScaler ADC and WAF protect customers from known and zero-day application attacks with a comprehensive security solution for web applications and Application Programming Interfaces (APIs) both on-premises and in the cloud. With the BrightCloud IP Reputation Service as its threat intelligence source, NetScaler can efficiently inspect client requests for attack traffic by filtering against known malicious IP addresses. NetScaler's research shows that BrightCloud IP Reputation Service offers the most comprehensive database of known problematic IP addresses. In fact, BrightCloud Threat Intelligence is used within nearly 85 percent of security solutions purchased by enterprises. "While filtering requests with malicious IP addresses is an effective method to protect applications from attacks, it can be a huge lift and increase inspection overhead. NetScaler came to us for a solution to this challenge that would save their customers time and be easy to operate and reliable. "Our BrightCloud IP Reputation Service easily integrates with any NetScaler ADC function, so that customers always have the most up-to-date threat intelligence at their fingertips. We are thrilled to partner with NetScaler to help improve the security posture of its customer base." Ted Harrison, EVP, Worldwide Enterprise Sales, OpenText Security Solutions With attack sources changing constantly, near real-time updates provided by BrightCloud are critical to safeguard NetScaler customers. Using BrightCloud IP Reputation Service, NetScaler can block application access to from IP addresses that are known, based on BrightCloud data, to be infected. In addition, BrightCloud's contextual mapping across different vectors such as file, domain, and malware data, continuously updates the IP reputation score and highlights typically less obvious connections to potential threat actors. IP reputation scores are updated every five minutes ensuring NetScaler customers have the most up-to-date protection. Citrix is a pioneer and leader in securing applications and delivering information to users wherever they are. Jason Poole, Director of Product Marketing, Application Security, said of the partnership, "In teaming with BrightCloud, we can provide our customers with an added layer of real-time protection and granular controls that protect against the new threats opened by flexible work models and ensure their devices, data, employees and customers remain safe." About OpenText Security Solutions As attack surfaces expand, OpenText Security Solutions help organizations of every size achieve cyber resilience with Webroot Security, Carbonite Data Management, BrightCloud® Threat Intelligence, and EnCase Digital Forensics and Threat Response. With a united front of best practices paired with layered solutions, we prevent, detect, and restore small, mid-sized and enterprise business operations in the event of a cybersecurity attack. About OpenText OpenText, The Information Company™, enables organizations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions.

Read More

DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY

SyncDog Announces Partnership with 3Eye Technologies to Expand Access to Mobile Endpoint Security Technology

SyncDog Inc. | October 28, 2022

SyncDog, Inc., the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, today announced a partnership with 3Eye Technologies to develop a smarter, more advanced offering for its mobility and cloud strategy to accelerate sales initiatives. SyncDog's Secure.Systems™ Workspace offers companies and government organizations a more secure and scalable solution for addressing all the challenges that go along with enabling employees on mobile devices—with immediate opportunities around helping to bring organizations into compliance with the federal government's CMMC 2.0 framework and other security & privacy regulatory standards. The rising popularity and rapid adoption of hybrid work models means that employees are empowered to conduct their work from wherever they are and on whatever device they have on hand–even personally owned (BYOD) devices. However, hybrid and remote work policies emphasize the importance of having robust data protection and endpoint security solutions. Now, more than ever, the ability for both private and public sector institutions to achieve compliance and adopt the cybersecurity and data protection standards outlined in industry frameworks is more critical than ever, as evidenced by the federal government's push to implement CMMC 2.0. In accordance with CMMC and other federally regulated requirements, SyncDog's unified Trusted Mobile Workspace provides a holistic, zero-trust approach that helps bring organizations into compliance with the federal government's CMMC framework along with other broadly recognized regulatory standards. "We are excited to partner with 3Eye to offer even more organizations a smarter and more efficient approach to a secure mobility architecture. A particularly compelling opportunity will be in enabling government employees and federal contractors to collaborate in real-time outside the office in a secure way – even while using BYOD/Personal devices – and still complying with CMMC 2.0 regulations. "This partnership will help broaden the range of organizations securely transferring data between the device and organization's secure network and provide reassurance that devices and processes they are following and implementing adhere to necessary regulations." Brian Egenrieder, Chief Revenue Officer at SyncDog "The prevalence of hybrid and remote work has IT and security teams grappling with ever evolving and complex cybersecurity challenges. This widespread workforce shift has made the need for enterprise mobility more important than ever, but these challenges are only exacerbated by the lack of robust mobile security strategies," said Conor MacFarlane, President and CEO of 3Eye Technologies. "SyncDog technology protects sensitive data no matter what device it is on, making it easier for people to conduct business securely. It's a terrific addition to our portfolio of highly advanced mobility and security technologies." 3Eye Technologies is a mobile-first distributor, who partners with best of breed vendors to provide the highest quality mobility, security, and identity solutions to deliver cutting-edge technologies through its reseller database. SyncDog will leverage 3Eye Technologies' distribution capabilities to build upon their growing market presence and connect SyncDog with more customers across new commercial markets and regions. About SyncDog Inc. SyncDog is the leading ISV for building mobile frameworks that extend app functionality to devices while securing corporate and government networks from mobile-endpoint threats. SyncDog's flagship solution, Secure.Systems, delivers a rich and unimpeded mobile experience for employees working remotely, and supports a multitude of enterprise productivity apps within a NIST-certified (FIPS 140-2 cert. #2687) workspace. Secure.Systems is ideal for organizations that want to deliver a rich mobile app experience across BYOD, CYOD (choose your own device), or other endpoint device policy. Secure.Systems is a natural complement to security and compliance auditing initiatives to satisfy the mandates of CMMC, HIPAA, GDPR, PCI DSS, GLBA, FISMA, and other laws/standards for data security. About 3Eye Technologies 3Eye Technologies is a value-added distributor of mobility, security, and identity solutions, committed to helping our partners identify, configure, and deliver solutions that enable seamless and secure work, wherever work gets done.

Read More

Spotlight

Malwarebytes engaged Osterman Research to undertake an in-depth survey of security professionals in five countries. The goal of the research was to understand the organizational costs associated with cybercriminal activity, and to understand what motivates some security professionals to join the “dark side” – i.e., to become either “gray hats”, who participate in criminal activity while also working as legitimate security professionals; or full-fledged “black hats” who operate solely within the realm of the cybercriminal underworld.

Resources