Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

The popularity of Kubernetes (K8s) as the defacto orchestration platform for the cloud is not showing any sign of pause. This graph, taken from the 2023 Kubernetes Security Report by the security company Wiz, clearly illustrates the trend:

As adoption continues to soar, so do the security risks and, most importantly, the attacks threatening K8s clusters. One such threat comes in the form of long-lived service account tokens. In this blog, we are going to dive deep into what these tokens are, their uses, the risks they pose, and how they can be exploited. We will also advocate for the use of short-lived tokens for a better security posture.

AI and Cybersecurity in 2024: What’s Changing and Why It Matters

As 2024 unfolds, the cybersecurity landscape is witnessing a notable transformation, primarily driven by the increasing integration of artificial intelligence (AI). Here's a deeper dive into what these changes entail and their significance in the cyber world.

The New Regulatory Landscape: Navigating Major Shifts

One of the most significant changes we're seeing is in the regulatory framework governing cybersecurity. Public companies are now required to report cybersecurity incidents within just four business days, marking a significant shift in corporate governance and cybersecurity management. This new mandate is reshaping how businesses approach cybersecurity, with a strong emphasis on compliance and proactive management of cybersecurity risks.

Yes, GitHub’s Copilot Can Leak (Real) Secrets

There has been a growing focus on the ethical and privacy concerns surrounding advanced language models like ChatGPT and OpenAI GPT technology. These concerns have raised important questions about the potential risks of using such models. However, it is not only these general-purpose language models that warrant attention; specialized tools like code completion assistants also come with their own set of concerns.

A year into its launch, GitHub’s code-generation tool Copilot has been used by a million developers, adopted by more than 20,000 organizations, and generated more than three billion lines of code, GitHub said in a blog post.

Microsoft AI Involuntarily Exposed a Secret Giving Access to 38TB of Confidential Data for 3 Years

The WIZ Research team recently discovered that an overprovisioned SAS token had been lying exposed on GitHub for nearly three years. This token granted access to a massive 38-terabyte trove of private data. This Azure storage contained additional secrets, such as private SSH keys, hidden within the disk backups of two Microsoft employees. This revelation underscores the importance of robust data security measures.

Microsoft AI


What Happened?

WIZ Research recently disclosed a data exposure incident found on Microsoft’s AI GitHub repository on June 23, 2023.

The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

Secrets, secrets, … and more secrets! You probably know that in an ever-expanding world of digital services, secrets are sprawling faster than ever. As security practitioners, we are expected to manage this ever-growing list of sensitive tokens, keys, and certificates with the same fluidity and with the same security guarantees, no matter the scale of operations.

Who Takes What?

The problem is that secrets management is still a major challenge for organizations, as highlighted by our recent State of Secrets in AppSec study, where 75% of respondents reported having experienced a past leak and less than half (48.1%) were completely confident in their capacity to prevent future leaks.

Top 10 Practices for Secure Software Development

Because of the increasing number of cyberattacks, security has become an integral element of SDLC (Software Development Lifecycle). Secure software development is a requirement to protect software from cybercriminals and hackers, minimize any vulnerabilities, and maintain users’ privacy.

In this article, we’ll provide a checklist of the top secure development practices. The leading concepts are that the best developer security practices make security everybody’s responsibility and provide a software development environment that’s secure from the application’s inception to its release.

Wake-Up Call: Why It’s Urgent to Deal With Your Hardcoded Credentials

It is clear today that the year 2021 will go down in the annals of IT security as the year when organizations really became aware of their inevitable dependence on open-source, and more importantly, of the risks posed by unsupervised supply chains.

High-profile security incidents like the SolarWinds, Kaseya, and Codecov data breaches have shaken enterprises’ confidence in the security practices of third-party service providers.

Automate Boring Tasks With Hooks

Most developers hate doing things that could be automated.

As emphasized in this tweet, we often have to accept that we cannot do it. Fortunately, in the case of code reviews, a lot of things can indeed be automated. As my previous CTO told me once:

4 Reasons MSPs Should Monitor Their GitHub Footprint

In recent years, resorting to MSPs has become very popular for companies wanting to accelerate the digitization of their businesses. With this surge in popularity, MSPs are broadening their range of responsibilities and now face the question: how to ensure we can meet our cybersecurity responsibilities?

In this article, we will see why monitoring in real-time code-sharing platforms such as GitHub should be a top priority for any MSP.

10 Rules for Better Cloud Security

Introduction

It’s estimated that already 50% of all global corporate data is being stored in the cloud, which is quite telling about the explosive growth of this still relatively young sector. We all know the benefits which propelled this adoption: increased agility, ease of scaling, and cost-effectiveness.

But regarding security, things are more nuanced: for some, the idea of handling most if not all of one business’s most valuable assets to a third-party organization is a kind of crazy, but for the (vast majority) of the others, it totally makes sense. You can benefit from the enormous security resources put in place by the cloud providers to protect your data, with the very best engineers working 24/7 to fulfill their mission. Even though, this is not quite the end of the story.

8 Easy Steps To Set Up Multiple Git Accounts (Cheat Sheet)

Disclaimer: Ok, Git "accounts" don't exist: we only have Git configurations. The title is an unorthodox shortcut to talk about accounts hosted by GitHub, GitLab, Bitbucket, and such. Not using these? Don't worry, you can still make great use of this cheat sheet to level up your .gitconfig game (look at step number 7).

Introduction

Let’s imagine a scenario: You’ve just joined a new company. It’s your first day and you need to set up your new machine. The first thing you do is to rush to get your own GitHub SSH key and install it so you can still work on your hobby project.