1_r/devopsish

1_r/devopsish

54497 bookmarks
Custom sorting
CVE-2024-3094 The targeted backdoor supply chain attack against XZ and libzma
CVE-2024-3094 The targeted backdoor supply chain attack against XZ and libzma
Learn about a new, targeted backdoor supply chain attack against the popular XZ compression utility seen in many Linux distributions such as fedora and debian. Understand it's impact, potential risks and what you can do about it.
·blog.sonatype.com·
CVE-2024-3094 The targeted backdoor supply chain attack against XZ and libzma
Linux xz Backdoor Damage Could Be Greater Than Feared
Linux xz Backdoor Damage Could Be Greater Than Feared
A mysterious contributor who planted the backdoor helped maintain the widely used xz compression library for the past two years. So what else was hidden in there?
·thenewstack.io·
Linux xz Backdoor Damage Could Be Greater Than Feared
Kubernetes and AI: Are They a Fit?
Kubernetes and AI: Are They a Fit?
At KubeCon Europe, we heard a lot about the current and future relationship of AI and Kubernetes, the orchestrator originally built to be stateless.
·thenewstack.io·
Kubernetes and AI: Are They a Fit?
I was just able to make a commit as this person, in my own repository
I was just able to make a commit as this person, in my own repository
BTW, I am not saying that this is what happened in the #xz backdoor case, but what does not help is, github makes it quite trivial to spoof user accounts... I was just able to make a commit as this person, in my own repository: https://t.co/h7TgTsT5J9 pic.twitter.com/EgoIdGzYKB— hasherezade (@hasherezade) March 31, 2024
·x.com·
I was just able to make a commit as this person, in my own repository
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs

Grand Finale - End to End Demo of the Choosen Tech (You Choose!, Ch. 3, Ep. 11)

Choose Your Own Adventure: The Treacherous Trek to Security - Grand Finale. In this episode, we'll go through all the choices ...

via YouTube https://www.youtube.com/watch?v=7-3dVxmG9qs

·youtube.com·
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs
Deploying Burp Suite Enterprise Edition to Kubernetes
Deploying Burp Suite Enterprise Edition to Kubernetes
To deploy Burp Suite Enterprise Edition to Kubernetes: Step 1: Set up your Kubernetes cluster Step 2: Install the application Step 3: Create the admin user ...
·portswigger.net·
Deploying Burp Suite Enterprise Edition to Kubernetes
All about the xz-utils backdoor | Kali Linux Blog
All about the xz-utils backdoor | Kali Linux Blog
As of 5:00 pm ET on March 29, 2024 the following information is accurate. Should there be updates to this situation, they will be edited onto this blog post. The xz-utils package, starting from versions 5.6.0 to 5.6.1, was found to contain a backdoor (CVE-2024-3094). This backdoor could potentially allow a malicious actor to compromise sshd authentication, granting unauthorized access to the entire system remotely.
·kali.org·
All about the xz-utils backdoor | Kali Linux Blog
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early
Poisoned Easter eggs for all: Apparent supply chain attack caught mercifully early…
·thestack.technology·
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early