#DevSecOps

2025-05-05

Default Helm charts in Kubernetes might be like leaving your front door unlocked – sensitive data and weak settings could be inviting trouble. Is your deployment really secure?

thedefendopsdiaries.com/enhanc

#kubernetessecurity
#helmcharts
#cybersecurity
#devsecops
#cloudsecurity

TechnoTenshi :verified_trans: :Fire_Lesbian:technotenshi@infosec.exchange
2025-05-05

AWS's own security audit tool for Organizations introduced privilege escalation risks by encouraging insecure deployments. Updated guidance fixes it, but affected orgs should review.

token.security/blog/aws-built-

#AWS #CloudSecurity #IAM #DevSecOps

2025-05-05

Our latest guide walks through:

- A cross-platform workflow using GitHub CLI, AWS CLI, and 1Password
- A portable Flox environment that handles secrets injection cleanly
- How to wrap tools like gh, git, and aws with secure auth
- A full sample workflow: deploy an AWS Lambda with zero manual token handling

Everything runs the same: locally, in CI, and in prod. Secrets stay out of logs, out of repos, and off disk.

Full guide: flox.dev/blog/get-your-preferr

#DevSecOps

2025-05-03

Bad Pods: поговорим о подах-плохишах

Обычно, когда мы говорим о безопасности Kubernetes, мы прежде всего говорим о защите подов от внешних угроз, но в некоторых случаях они сами могут представлять определенную опасность. Для того, чтобы эти угрозы мог реализовать атакующий, у него должны быть доступ к кластеру, разрешение RBAC на создание одного некоторых типов ресурсов (CronJob, DeamonSet, Deployment, Job, Pod, ReplicaSet, ReplicationController, StatefulSet) хотя бы в одном пространстве имен, и также должны отсутствовать политики безопасности. Если у вас все это есть — тогда мы идем к вам в этой статье мы рассмотрим, какие атаки из подов вам могут грозить. А даже если есть не все, то особенно расслабляться все равно не стоит.

habr.com/ru/companies/otus/art

#devsecops #pentest #kubernetes #поды #Защита_от_атак #rbac #информационная_безопасность

2025-05-03

📣 Announcing #SBOMlearningWeek! 5 days of educational content to help you master Software Bill of Materials. From fundamentals to advanced implementation, we'll guide you through securing your software supply chain with SBOMs. Follow along starting Monday! anchore.com/blog/anchores-sbom #DevSecOps

2025-05-02

Turn #FedRAMP from a cost center into a competitive advantage with our latest white paper.

Learn how automation and policy-as-code can streamline compliance while opening doors to federal business!

🔗 anchore.com/blog/navigating-th

#FedRAMP #DevSecOps #Compliance

Reboot Chronicles-Dean DeBiasedeandebiase
2025-05-02

Watch Listen Subscribe wherever you get podcasts or here>> zurl.co/CAYCp
With the AI hype cycle spiraling forward, Peter McKay - CEO of Synk. Watch or listen in on this episode as Peter shares how he rebooted Snyk and how they are on their way toward being a billion-dollar market leader.

OWASP Foundationowasp@infosec.exchange
2025-05-02

Get pumped for #OWASP Global #AppSec EU in May! Enhance your experience by becoming a Mentor and building lasting connections while assisting others on their journey! Don't miss out, sign up here: owasp.wufoo.com/forms/zk2cdkr1 🚀 #CyberSecurity #AI #threatmodeling #Barcelona #devsecops #infosec

OWASP Foundationowasp@infosec.exchange
2025-05-02

Join Magnus Jungsbluth at OWASP Global AppSec EU 2025 in Barcelona for an inside look at scaling Policy as Code across thousands of applications!

🛡️ Policy as Code for Applications at Scale
📅 Thursday, May 29, 2025
⏰ 3:30 PM – 4:15 PM CEST

🔗 Register: owasp.glueup.com/event/123983/

A must-attend for platform engineers, appsec leaders, and anyone scaling security across modern organizations.

#OWASP #AppSecEU2025 #OPA #DevSecOps #PlatformEngineering #AppSec #Barcelona

JAVAPROjavapro
2025-05-02

A single SQL line. One careless deserialization. That's all it takes to bring your app down. @vilojona shows how even top teams get it wrong and how you can get it right. Ready to patch your blind spots?

Start here: javapro.io/2025/04/29/top-secu

OWASP Foundationowasp@infosec.exchange
2025-05-01

Get ready to shine on stage! ✨ Don't miss the chance to showcase your skills at #OWASP Global #AppSec USA in Washington, DC this November. Submit your presentations now for an incredible opportunity. Apply here: sessionize.com/owasp-global-ap 🎤 #infosec #AI #devsecops #SBOMM

2025-05-01

🚨 RCE Vulnerability in Node.js CI Pipeline Exposed Millions to Potential Supply Chain Attack

Security researchers have uncovered a serious flaw in the Node.js CI/CD architecture — one that allowed attackers to hijack internal Jenkins agents and execute arbitrary code.

The core issue? A Time-of-Check-Time-of-Use (TOCTOU) vulnerability in the communication between GitHub Actions and Jenkins pipelines. By forging a commit timestamp that predates a maintainer’s approval, attackers could smuggle malicious code past security checks and straight into Jenkins execution.

Here’s what made this attack so dangerous:
- It bypassed the `checkCommitsAfterReviewOrLabel()` function.
- It enabled attackers to compromise Jenkins infrastructure.
- It even risked injecting malware into the Node.js main branch — impacting the entire ecosystem.

Praetorian reported the flaw on March 21. The Node.js team responded fast:
- Restricted access to Jenkins CI.
- Rebuilt 24 potentially compromised machines.
- Switched from timestamp checks to SHA-based validation.
- Audited 140+ Jenkins jobs and patched the commit-queue workflow.

This is a wake-up call for every company using multi-platform CI/CD pipelines:
- Integration between platforms creates invisible attack surfaces.
- Automated approvals and cross-platform handoffs must be treated as critical security boundaries.

Credit to the Node.js team for their transparency and swift mitigation — but the lesson is clear:

If you're not securing the spaces between your DevOps tools, you're leaving the door wide open.

#SupplyChainSecurity #NodeJS #DevSecOps

Steve Fenton ➜stevefenton
2025-05-01

Meanwhile in DevOps No.27

Murray introduces DevSecOps!

Murray and Arlo are discussing changes to their software delivery approach. Murray is looking happy and a little vacant.

“We’re adopting DevSecOps instead of DevOps,” Murray says.

“Doesn’t DevOps already include security?” Arlo asks.

“DevOps has,” Murray begins. “We never have.”
TechnoTenshi :verified_trans: :Fire_Lesbian:technotenshi@infosec.exchange
2025-04-30

Kexa offers automated compliance checks for multi-cloud environments like AWS, GCP, and Azure—supporting CI/CD integration, rule-based scanning, and real-time alerts via common channels.

github.com/kexa-io/Kexa

#CloudCompliance #OpenSource #DevSecOps #InfoSec

2025-04-30

The federal cloud market is headed toward $78B by 2029. Is your business ready?

Our FedRAMP guide shows you how to unlock these opportunities with a strategic approach to compliance. Download now!

🔗 anchore.com/blog/navigating-th

#FedRAMP #DevSecOps #Compliance

OWASP Foundationowasp@infosec.exchange
2025-04-29

Get ready to shine on stage! ✨ Don't miss the chance to showcase your skills at #OWASP Global #AppSec USA in Washington, DC this November. Submit your presentations now for an incredible opportunity to share your expertise. Apply here: sessionize.com/owasp-global-ap 🎤 #infosec #AI #devsecops #SBOMM

Brian Benzbbenz
2025-04-29

MCP adoption in AI is skyrocketing 🚀, but so are the risks. Microsoft's Sarah Young & Den Delimarsky have a fresh blog on thwarting indirect injection attacks and more 🔒🤖🛡️.

Read it: devblogs.microsoft.com/blog/pr

Mr Tech Kingmrtechking
2025-04-29

Heads up developers. AI-generated code often includes 'hallucinated' non-existent packages. New research finds nearly 20% are fake, creating a huge risk for supply-chain attacks via dependency confusion. Always verify AI suggestions.

AI Code's Fake Package Problem Risks Your Software Security.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst