#gitguardian
Explore tagged Tumblr posts
jpmellojr · 1 year ago
Text
The state of secrets security: 7 action items for better managing risk
Tumblr media
The exposure of development secrets is a growing epidemic, driven by software supply chain complexity. Over 4 years, exposed secrets have quadrupled.
Read more: https://jpmellojr.blogspot.com/2024/04/the-state-of-secrets-security-7-action.html
0 notes
cyber-sec · 1 year ago
Text
Python's PyPI Reveals Its Secrets
Tumblr media
Source: https://thehackernews.com/2024/04/gitguardian-report-pypi-secrets.html
Report: https://www.gitguardian.com/files/the-state-of-secrets-sprawl-report-2024
2 notes · View notes
learning-code-ficusoft · 22 days ago
Text
What is DevSecOps? Integrating Security into the DevOps Pipeline
Tumblr media
What is DevSecOps? Integrating Security into the DevOps Pipeline
In today’s fast-paced digital landscape, delivering software quickly isn’t just a competitive advantage — it’s a necessity. Enter DevOps: the fusion of development and operations, aimed at streamlining software delivery through automation, collaboration, and continuous improvement. But as we build faster, we must also build safer. That’s where DevSecOps comes in.
What is DevSecOps?
DevSecOps stands for Development, Security, and Operations. It’s an evolution of the DevOps philosophy that embeds security practices directly into the DevOps pipeline — from planning to production. Instead of treating security as a final step or a separate process, DevSecOps makes it an integral part of the development lifecycle.
In short: DevSecOps = DevOps + Continuous Security.
Why DevSecOps Matters
Traditional security models often acted as bottlenecks, kicking in late in the software lifecycle, causing delays and costly rework. In contrast, DevSecOps:
Shifts security left — addressing vulnerabilities early in development.
Promotes automation of security checks (e.g., static code analysis, dependency scanning).
Encourages collaboration between developers, security teams, and operations.
The result? Secure, high-quality code delivered at speed.
Key Principles of DevSecOps
Security as Code  Just like infrastructure can be managed through code (IaC), security rules and policies can be codified, versioned, and automated.
Continuous Threat Modeling  Teams assess risk and architecture regularly, adapting to changes in application scope or external threats.
Automated Security Testing  Security tools are integrated into CI/CD pipelines to scan for vulnerabilities, misconfigurations, or compliance issues.
Culture of Shared Responsibility  Security isn’t just the InfoSec team’s job. Everyone in the pipeline — from devs to ops — has a role in maintaining secure systems.
Monitoring and Incident Response  Real-time logging, monitoring, and alerting help detect suspicious behavior before it becomes a breach.
How to Integrate DevSecOps into Your Pipeline
Here’s a high-level roadmap to start embedding security into your DevOps process:
Plan Securely: Include security requirements and threat models during planning.
Develop Secure Code: Train developers in secure coding practices. Use linters and static analysis tools.
Build with Checks: Integrate SAST (Static Application Security Testing) and SCA (Software Composition Analysis) into your build process.
Test Continuously: Run DAST (Dynamic Application Security Testing), fuzzing, and penetration testing automatically.
Release with Confidence: Use automated security gates to ensure only secure builds go to production.
Monitor Proactively: Enable real-time monitoring, anomaly detection, and centralized logging.
Popular DevSecOps Tools
SAST: SonarQube, Checkmarx, Fortify
DAST: OWASP ZAP, Burp Suite
SCA: Snyk, WhiteSource, Black Duck
Secrets Detection: GitGuardian, TruffleHog
Container Security: Aqua Security, Prisma Cloud, Clair
Final Thoughts
DevSecOps is not just about tools — it’s a mindset shift. It breaks down silos between development, operations, and security teams, making security a shared, continuous responsibility. By baking security into every stage of your pipeline, you ensure your applications are not only fast and reliable — but also secure by design.
WEBSITE: https://www.ficusoft.in/devops-training-in-chennai/
0 notes
ericvanderburg · 5 months ago
Text
GitGuardian launches multi-vault integration to combat secrets sprawl
http://securitytc.com/TGs0mq
0 notes
acquaintsofttech · 7 months ago
Text
Humorous Cybersecurity Mistakes in MEAN Stack Development
Introduction
The MEAN stack, i.e. MongoDB, Express.js, Angular, and Node.js have become highly well-liked among developers in the dynamic field of web development as they create scalable, dynamic apps.
Tumblr media
However, the MEAN stack is not impervious to its fair share of cybersecurity disasters, just like any other technology. Even though cybersecurity can be extremely dangerous, there are instances when it makes sense to be lenient toward mistakes and stupidities made throughout the development process. Now, let's explore some of the most humorous, yet instructive, cybersecurity errors that occurred throughout the creation of the MEAN stack.
The Tale of the Misconfigured MongoDB
Tumblr media
The Incident
Dave was a fresh graduate, eager to make his mark in the world of web development. He had learned the basics of the MEAN stack and landed a project to build an e-commerce application. Dave set up MongoDB with a sense of accomplishment but skipped the step of securing the database with authentication, thinking it was something he could do later.
Days went by, and everything seemed to be working perfectly. The application was getting positive feedback, and Dave was thrilled. One morning, however, Dave received a call from his project manager, who sounded alarmed. The application was experiencing a data breach, and sensitive customer information was being leaked.
The Aftermath
Upon investigation, it was discovered that the MongoDB instance was left open to the internet without any authentication. Cyber attackers had found the unsecured database and had a field day, extracting valuable data. Dave learned the hard way that in cybersecurity, "later" is not an option.
In-Depth Solution
To prevent such mishaps, always ensure that MongoDB instances are secured with proper authentication and authorization mechanisms. Use environment variables to store sensitive information like database credentials securely. Regularly audit your configurations and access controls to ensure that no weak points are left unprotected. Additionally, consider using firewalls and VPNs to restrict access to your database servers.
The Curious Case of the Exposed API Keys
Tumblr media
The Incident
Sarah was known for her meticulous coding and her ability to integrate complex APIs seamlessly. She was working on integrating a payment gateway into her MEAN stack application. The integration was flawless, and the application went live without any issues. However, Sarah made a critical error, she hard-coded the API keys directly into her codebase and pushed it to her public GitHub repository.
A few weeks later, Sarah started noticing unusual activity in her account for the third-party service. Someone was using her API keys to make unauthorized transactions. The realization hit hard that her API keys were exposed to anyone with access to her public repository.
The Aftermath
Sarah had to revoke the exposed API keys and generate new ones. She also had to go through the tedious process of securing her repository and ensuring that no other sensitive information was exposed. The unauthorized transactions had caused significant financial damage, and Sarah's company had to bear the brunt.
In-Depth Solution
To avoid such situations, never hard-code API keys, passwords, or any other sensitive information directly into your codebase. Use environment variables to manage these secrets securely. Tools like dotenv for Node.js can help you manage environment variables effectively. Regularly review your repository settings and use tools like GitGuardian to scan for exposed secrets in your codebase. Additionally, enable two-factor authentication (2FA) for your accounts to add an extra layer of security.
The Not-So-Anonymous Admin
The Incident
Tom was a seasoned developer tasked with creating an admin panel for his MEAN stack application. To make the setup process quick and easy, Tom created a default admin account with the username "admin" and password "admin123." He planned to change the credentials before the application went live but got caught up in other tasks and forgot.
The application launched, and everything seemed to be running smoothly. That is, until one day, Tom received an alert that someone had logged into the admin panel from an unknown location. The attacker had gained full control over the application, including access to sensitive user data.
The Aftermath
Tom's oversight had caused a significant security breach. The attacker had changed settings, deleted data, and even managed to steal user information. Tom had to shut down the application, revoke the compromised admin account, and conduct a thorough security audit to ensure no other vulnerabilities existed.
In-Depth Solution (Continued)
Always use strong, unique credentials for all user accounts, especially administrative ones. Implement multi-factor authentication (MFA) for an additional layer of security, requiring users to verify their identity through a secondary device or method. Regularly audit user accounts and permissions to ensure that only authorized individuals have access to sensitive areas of your application. Additionally, consider implementing role-based access control (RBAC) to limit the permissions of each user based on their role within the organization.
The Woes of Insecure CORS Configuration
Tumblr media
The Incident
Emma was an enthusiastic developer excited about creating a RESTful API for her MEAN stack application. To ensure that her API was accessible from various domains, she decided to configure the Cross-Origin Resource Sharing (CORS) policy. In her haste, she set the CORS policy to allow all origins (*), thinking it would be a quick fix to any cross-domain issues.
Months later, Emma started noticing suspicious activity. Malicious actors were making unauthorized requests to her API from various domains, exploiting the overly permissive CORS policy. The lack of proper restrictions had left her application vulnerable to cross-site request forgery (CSRF) attacks.
The Aftermath
Emma had to quickly reconfigure her CORS policy to restrict access to only trusted origins. She also had to implement additional security measures to prevent further exploitation of her API. The incident served as a stark reminder of the importance of properly securing APIs.
In-Depth Solution
When configuring CORS policies, always specify trusted origins to limit access to your API. Avoid using the wildcard * for allowed origins unless absolutely necessary. Implement proper authentication and authorization mechanisms to ensure that only legitimate requests are process. Use tools like JWT (JSON Web Tokens) to secure API endpoints and consider implementing CSRF tokens for additional protection.
The Perils of Poor Input Validation
The Incident
Mike was a developer racing against the clock to meet a tight deadline. He was tasked with creating a user registration form for his MEAN stack application. To save time, Mike decided to skip through input validation, assuming he would add it later. Users started registering, and everything appeared to be functioning smoothly.
However, Mike soon noticed strange entries in the database. An attacker had been exploiting the lack of input validation to inject malicious scripts through the registration form. This oversight had left the application vulnerable to SQL injection and cross-site scripting (XSS) attacks.
The Aftermath
Mike had to halt user registrations and implement comprehensive input validation and sanitization. He also had to clean the database of malicious entries and fortify the application against future attacks. The incident underscored the critical importance of validating user inputs from the outset.
In-Depth Solution
Always validate and sanitize user inputs on both the client-side and server-side. Use built-in validation libraries and frameworks that provide protection against common vulnerabilities. For example, use Mongoose for MongoDB to enforce schema validation. Implement escaping and encoding techniques to prevent XSS attacks and use parameterized queries to safeguard against SQL injection. Never trust user input blindly, and assume that all input is potentially malicious.
The Saga of the Unpatched Dependencies
The Incident
Lisa was a diligent developer who made sure to use the latest libraries and frameworks for her MEAN stack application. However, in her quest to stay current, she neglected to regularly check for security updates and patches for her dependencies. Lisa's application was running smoothly until one day, it was compromised due to a known vulnerability in one of the libraries she used.
The Aftermath
Lisa had to scramble to update all her dependencies and patch the vulnerability. The attack had caused downtime and affected user trust in the application. Lisa realized that keeping dependencies up-to-date was not just about having the latest features, but also about maintaining security.
In-Depth Solution
Regularly update your dependencies and stay informed about security patches. Use tools like npm audit and yarn audit to identify and fix vulnerabilities in your project. Automate dependency management using tools like Dependabot or Renovate to ensure that you are always using the latest, secure versions of libraries. Subscribe to security mailing lists and follow best practices for dependency management to minimize the risk of vulnerabilities.
The Mystery of the Missing HTTPS
The Incident
Jack was thrilled to launch his MEAN stack application and see users signing up and interacting with his app. However, he soon started receiving complaints about security warnings in users' browsers. Upon investigation, Jack realized he had forgotten to configure HTTPS for his application, leaving it vulnerable to man-in-the-middle attacks.
The Aftermath
Sensitive data, include user credentials, was being transmitted over an unencrypted connection, exposing it to potential eavesdropping and tampering. Jack had to quickly obtain and configure SSL/TLS certificates to secure the communication between clients and the server. The oversight caused users to lose trust in the application's security.
In-Depth Solution
Always use HTTPS to encrypt data transmitted between the client and server. Obtain SSL/TLS certificates from a trusted Certificate Authority (CA) and configure them for your application. Tools like Let's Encrypt provide free certificates and automated renewal services. Use HSTS (HTTP Strict Transport Security) headers to enforce HTTPS and prevent downgrade attacks. Regularly test your SSL/TLS configuration using tools like Qualys SSL Labs to ensure it meets security standards.
The Paradox of Over-Engineering Security
The Incident
Alex was a developer passionate about cybersecurity. Determined to make his MEAN stack application impenetrable, Alex implemented every security measure imaginable, from complex encryption algorithms to multi-layered firewalls. However, the result was an overly complex and cumbersome application that was difficult to maintain and performed poorly.
The Aftermath
Users were frustrated with slow response times and frequent security prompts. The excessive security measures made the application difficult to use and maintain, leading to a negative user experience. Alex realized that while security is crucial, it should not come at the expense of usability and performance.
In-Depth Solution
Strike a balance between security and usability. Implement necessary security measures based on risk assessment and prioritize those that have the most significant impact on protecting your application. Regularly review and optimize your security measures to ensure they do not hinder performance or user experience. Engage with security professionals to conduct threat modeling and vulnerability assessments to identify and address the most critical risks.
Now, let us understand how Acquaint Softtech can help in developing a security proof MEAN Stack development
How can Acquaint Softtech help?
Software development outsourcing and IT staff augmentation are two services provided by Acquaint Softtech, an IT outsourcing company. As an official Laravel partner, we take great pride in using the Laravel framework to create new applications.
Acquaint Softtech is the best choice if your business is looking to hire remote developers. With our accelerated onboarding process, developers can join your existing team in as little as 48 hours.
Because of our $15 hourly fee, we are also the best choice for any kind of outsourced software development task. We can help you to hire remote developers, hire MEAN stack developers, hire MERN stack developers, and outsourced development services to meet your needs for specialized development. Let’s scale your business today & achieve new heights.
Conclusion
Cybersecurity is an essential aspect of MEAN stack development, and while it's important to take it seriously, we can also learn from the lighter side of mishaps. By understanding these common mistakes and the lessons they teach, developers can build more secure and resilient applications.
Always remember to secure your databases, protect your API keys, use strong credentials, configure CORS policies wisely, validate user inputs, keep dependencies up-to-date, use HTTPS, and avoid over-engineering security measures. Through these best practices, we can ensure our applications remain safe and our users' data secure. Happy coding!
0 notes
the-hacker-news · 1 year ago
Text
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
The Hacker News : All developers want to create secure and dependable software. They should feel proud to release their code with the full confidence they did not introduce any weaknesses or anti-patterns into their applications. Unfortunately, developers are not writing their own code for the most part these days. 96% of all software contains some open-source components, and open-source components make http://dlvr.it/T77sp7 Posted by : Mohit Kumar ( Hacker )
0 notes
kennak · 1 year ago
Quote
GitHub ユーザーは、2023 年中に 300 万以上のパブリック リポジトリにある 1,280 万件の認証情報と機密情報を誤って公開し、その大部分は 5 日後でも有効のままでした。 のサイバーセキュリティ専門家によると これは、 GitGuardian 、GitGuardian は機密を暴露した人に 180 万通の無料電子メール警告を送信しましたが、連絡を受けた人のうち、エラーを修正するために迅速な行動をとったのはわずか 1.8% のみでした。 公開された秘密には、��カウントのパスワード、API キー、TLS/SSL 証明書、暗号化キー、クラウド サービスの資格情報、OAuth トークン、その他の機密データが含まれており、外部の攻撃者がさまざまなプライベート リソースやサービスに無制限にアクセスできるようになり、データ侵害や金銭的損害につながる可能性があります。 。 2023 年のソフォスのレポートでは、 今年上半期に記録されたすべての攻撃の根本原因の50% は認証情報の漏洩が原因であり 、続いて 23% のケースで攻撃方法として脆弱性の悪用があったことが強調されています。 GitGuardian によると、世界で最も人気のあるコード ホスティングおよびコラボレーション プラットフォームである GitHub での秘密の暴露は 2020 年以降、マイナスの傾向をたどっています。
2023 年に 1,200 万を超える認証シークレットとキーが GitHub で漏洩
1 note · View note
statesone · 2 years ago
Text
How to Secure Your IaC and Configuration Management Tools with GitGuardian’s Honeytoken - Security Boulevard
📣 StatesOne — https://news.google.com/rss/articles/CBMifWh0dHBzOi8vc2VjdXJpdHlib3VsZXZhcmQuY29tLzIwMjMvMDcvaG93LXRvLXNlY3VyZS15b3VyLWlhYy1hbmQtY29uZmlndXJhdGlvbi1tYW5hZ2VtZW50LXRvb2xzLXdpdGgtZ2l0Z3VhcmRpYW5zLWhvbmV5dG9rZW4v0gGBAWh0dHBzOi8vc2VjdXJpdHlib3VsZXZhcmQuY29tLzIwMjMvMDcvaG93LXRvLXNlY3VyZS15b3VyLWlhYy1hbmQtY29uZmlndXJhdGlvbi1tYW5hZ2VtZW50LXRvb2xzLXdpdGgtZ2l0Z3VhcmRpYW5zLWhvbmV5dG9rZW4vYW1wLw?oc=5&utm_source=dlvr.it&utm_medium=tumblr
0 notes
cybersecurity4humans · 2 years ago
Link
via
0 notes
orbitbrain · 2 years ago
Text
Big Tech Vendors Object to US Gov SBOM Mandate
Big Tech Vendors Object to US Gov SBOM Mandate
Home › Cyberwarfare Big Tech Vendors Object to US Gov SBOM Mandate By Ryan Naraine on December 07, 2022 Tweet The U.S. government’s mandates around the creation and delivery of SBOMs (software bill of materials) to help mitigate supply chain attacks has run into strong objections from big-name technology vendors. A lobbying outfit representing big tech is calling on the federal government’s…
View On WordPress
0 notes
aserougi · 2 years ago
Text
GitGuardian’s honeytokens in codebase to fish out DevOps intrusion
http://dlvr.it/SmJSPG t.ly/m_Jb
0 notes
demianblog · 2 years ago
Text
Amenaza interna: los desarrolladores filtraron 10 millones de credenciales y contraseñas en 2022
La tasa a la que los desarrolladores filtraron secretos de software críticos, como contraseñas y claves API, aumentó a la mitad para llegar a 5,5 de cada 1000 confirmaciones en los repositorios de GitHub. Eso es según un informe publicado por la firma de gestión de secretos GitGuardian esta semana. Aunque el porcentaje parece pequeño, en general, la empresa detectó al menos 10 millones de…
Tumblr media
View On WordPress
0 notes
ericvanderburg · 7 months ago
Text
GitGuardian Visual Studio Code extension helps developers protect their sensitive information
http://securitytc.com/TFK5WT
0 notes
kalilinux4u · 3 years ago
Photo
Tumblr media
Code security platform @GitGuardian releases its annual ‘State of Secrets Sprawl Report’ 🦉 It measure the exposure of secrets within #GitHub, #Docker, and internal repositories and how it evolves over time. Find out, & much more, in this ungated report: https://t.co/sGNXosEpRP https://t.co/Ms8QhrTLmP (via Twitter https://twitter.com/TheHackersNews/status/1531564228674433026)
0 notes
the-hacker-news · 1 year ago
Text
Python's PyPI Reveals Its Secrets
The Hacker News : GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets in GitHub, but a number in the popular Python package repository PyPI. PyPI, http://dlvr.it/T5NCZl Posted by : Mohit Kumar ( Hacker )
0 notes
hackgit · 3 years ago
Text
[Media] ​​ggshield
​​ggshield Protect your secrets with GitGuardian ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets, as well as other potential security vulnerabilities or policy breaks. https://github.com/GitGuardian/ggshield
Tumblr media
0 notes