Mackenzie JacksoninGitGuardianWhy ChatGPT is a security concern for your organization (even if you don’t use it)ChatGPT came into 2023 with ferocious force, but AI and large language models are not all that new, before I was writing articles about…May 15, 2023May 15, 2023
Mackenzie JacksoninGitGuardianThe State of Security in Australia: HackSydney and BSides give insight into security post-Medibank…Cybersecurity in Australia has moved well and truly into the focus of the mainstream media and the everyday public. This year we saw two…Jan 24, 2023Jan 24, 2023
Mackenzie JacksoninGitGuardianCrappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your faultJune 2021 presented an opportunity for me to live out my dream of actually being a “good” developer. June was the month GitHub Copilot was…Oct 25, 2022Oct 25, 2022
Mackenzie JacksoninGitGuardianPoisoning the source — How and why attackers are targeting developer accountsMost organizations today are software development companies. It doesn’t matter much if you are building the latest in cloud computing…Oct 24, 2022Oct 24, 2022
Mackenzie JacksoninGitGuardianSecuring your SDLC (Software Development Life Cycle)Building security into our applications is widely considered to be an important priority in mature companies. But even still it is often…Oct 12, 20221Oct 12, 20221
Mackenzie JacksoninGitGuardianLatest from Lapsus$, Reviewing the Microsoft BreachLapsus$ has continued its prolific pace of breaches now leaking internal source code from 250 Microsoft projects which the group has…Jul 18, 2022Jul 18, 2022
Mackenzie JacksoninGitGuardianSamsung and Nvidia are the latest companies to involuntarily go open-source leaking company secretsNearly 200GB of source code from Samsung and the source code from Nvidia’s latest DLSS technology has been published online by The Lapsus$…Jul 18, 2022Jul 18, 2022
Mackenzie JacksoninGitGuardianSource Code as a Vulnerability — A Deep Dive into the Real Security Threats From the Twitch LeakPlease note no information exposed here can be used to harm Twitch and we have provided them with a detailed report outlining the…Feb 18, 2022Feb 18, 2022
Mackenzie JacksoninGitGuardianSupply Chain Attacks: 6 Steps to protect your software supply chainOver the past few years, we have seen a massive increase in software Supply Chain attacks. What is a supply chain attack? This is a type of…Dec 2, 2021Dec 2, 2021
Mackenzie JacksoninGitGuardianCodecov supply chain attack breakdownhttps://youtu.be/Q-s3mnAx6uAJun 21, 2021Jun 21, 2021