Open in app

Sign In

Write

Sign In

Mackenzie Jackson
Mackenzie Jackson

12 Followers

Home

About

Published in GitGuardian

·Jan 24

The State of Security in Australia: HackSydney and BSides give insight into security post-Medibank and Optus

Cybersecurity in Australia has moved well and truly into the focus of the mainstream media and the everyday public. This year we saw two catastrophic security breaches with Optus, an Australian telecom provider, and Medibank, one of the largest health insurance providers in Australia. Both breaches saw huge amounts of…

Security

5 min read

The State of Security in Australia: HackSydney and BSides give insight into security post-Medibank…
The State of Security in Australia: HackSydney and BSides give insight into security post-Medibank…
Security

5 min read


Published in GitGuardian

·Oct 25, 2022

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault

June 2021 presented an opportunity for me to live out my dream of actually being a “good” developer. June was the month GitHub Copilot was introduced. Yes! I thought, no more embarrassing code reviews, no more endless scrolling through stack overflow. I Will Be A Genius! While that didn’t end…

Github

5 min read

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault
Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault
Github

5 min read


Published in GitGuardian

·Oct 24, 2022

Poisoning the source — How and why attackers are targeting developer accounts

Most organizations today are software development companies. It doesn’t matter much if you are building the latest in cloud computing services or manufacturing paint, you most likely have a team of software engineers building proprietary systems and at the very least you rely heavily on commercial software to keep your…

Appsec

9 min read

Poisoning the source — How and why attackers are targeting developer accounts
Poisoning the source — How and why attackers are targeting developer accounts
Appsec

9 min read


Published in GitGuardian

·Oct 12, 2022

Securing your SDLC (Software Development Life Cycle)

Building security into our applications is widely considered to be an important priority in mature companies. But even still it is often overlooked at earlier stages of the development making the cost of security exponentially higher the later in the process we start to consider it. …

Cybersecurity

14 min read

Securing your SDLC (Software Development Life Cycle)
Securing your SDLC (Software Development Life Cycle)
Cybersecurity

14 min read


Published in GitGuardian

·Jul 18, 2022

Latest from Lapsus$, Reviewing the Microsoft Breach

Lapsus$ has continued its prolific pace of breaches now leaking internal source code from 250 Microsoft projects which the group has claimed is 90% of the source code for Bing and 45% of the source code for Bing Maps and Cortana. …

Devsecops

5 min read

Latest from Lapsus$, Reviewing the Microsoft Breach
Latest from Lapsus$, Reviewing the Microsoft Breach
Devsecops

5 min read


Published in GitGuardian

·Jul 18, 2022

Samsung and Nvidia are the latest companies to involuntarily go open-source leaking company secrets

Nearly 200GB of source code from Samsung and the source code from Nvidia’s latest DLSS technology has been published online by The Lapsus$ hacking group. Internal source code being leaked online by adversaries is happening with alarming regularity in recent years. Only a few months have gone by since…

Lapsus

4 min read

Samsung and Nvidia are the latest companies to involuntarily go open-source leaking company secrets
Samsung and Nvidia are the latest companies to involuntarily go open-source leaking company secrets
Lapsus

4 min read


Published in GitGuardian

·Feb 18, 2022

Source Code as a Vulnerability — A Deep Dive into the Real Security Threats From the Twitch Leak

Please note no information exposed here can be used to harm Twitch and we have provided them with a detailed report outlining the vulnerabilities discovered.

Twitch Breach

9 min read

Source Code as a Vulnerability — A Deep Dive into the Real Security Threats From the Twitch Leak
Source Code as a Vulnerability — A Deep Dive into the Real Security Threats From the Twitch Leak
Twitch Breach

9 min read


Published in GitGuardian

·Dec 2, 2021

Supply Chain Attacks: 6 Steps to protect your software supply chain

Over the past few years, we have seen a massive increase in software Supply Chain attacks. What is a supply chain attack? This is a type of cyber security attack where adversaries slip malicious code or components into a trusted piece of software or hardware. The goal of such an…

Application Security

11 min read

Supply Chain Attacks: 6 Steps to protect your software supply chain
Supply Chain Attacks: 6 Steps to protect your software supply chain
Application Security

11 min read


Published in GitGuardian

·Jun 21, 2021

Codecov supply chain attack breakdown

https://youtu.be/Q-s3mnAx6uA TL;DR This breach was done by very sophisticated attackers who exploited a mistake in how Codecov built docker images. They used this to modify a script which allowed them to send the environment variables from the CI of Codecov customers to a remote server. While the attackers could have conducted…

Cybersecurity

8 min read

Codecov supply chain attack breakdown
Codecov supply chain attack breakdown
Cybersecurity

8 min read


Published in GitGuardian

·Mar 26, 2021

How hackers breached the Indian government: Analysis

This is another attack executed by the white hat hacking group Sakura Samurai however what makes this breach in particular so interesting is the multiple state-owned organizations that were affected. In total, 26 different government departments and organizations were compromised. …

Cybersecurity

9 min read

How hackers breached the Indian government: Analysis
How hackers breached the Indian government: Analysis
Cybersecurity

9 min read

Mackenzie Jackson

Mackenzie Jackson

12 Followers
Following
  • Terence Shin

    Terence Shin

  • SDCat

    SDCat

  • Gadi Evron

    Gadi Evron

  • Omar BV

    Omar BV

  • Threat Intel

    Threat Intel

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech