🎶’twas the night before Christmas, and nothing looked strange, until malicious artifacts showed up in the change 🎶 in light of some recent open source malware campaigns, we’ve outlined some practical steps teams can take now - using phishing-resistant MFA, rotating and scoping tokens, reviewing third-party access, and adopting safer package publishing workflows a little security cleanup now can help avoid unwelcome presents in the new year 🎁 read the post: https://lnkd.in/eEEngZ8v
Prevent Malware in Open Source with Phishing-Resistant MFA
More Relevant Posts
-
Good stuff from my wonderful friends over at GitHub Security Lab. I can't repeat this forcefully enough - if you're a dev, you need to be using strong, phishing-resistant MFA _everywhere_. Full stop, no excuses. Passkeys backed by biometrics or a hardware key are awesome. A regular hardware key is also a huge step above TOTP and definitely SMS. Businesses: Internally, enforce requirements for phishing-resistant MFA with your identity solution. If you have a public platform, require MFA for sensitive actions, if not carte blanche.
🎶’twas the night before Christmas, and nothing looked strange, until malicious artifacts showed up in the change 🎶 in light of some recent open source malware campaigns, we’ve outlined some practical steps teams can take now - using phishing-resistant MFA, rotating and scoping tokens, reviewing third-party access, and adopting safer package publishing workflows a little security cleanup now can help avoid unwelcome presents in the new year 🎁 read the post: https://lnkd.in/eEEngZ8v
To view or add a comment, sign in
-
Cybersecurity researchers have revealed a cross-site scripting (XSS) vulnerability in the web-based control panel used by StealC operators—an information‑stealing malware. The flaw allowed investigators to gather valuable intelligence about one of the actors deploying the malware in real-world campaigns. https://lnkd.in/e4G8UfhU
To view or add a comment, sign in
-
🛡️ Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations 📅 Mon, 19 Jan 2026 12:23:00 +0530 Cybersecurity researchers have disclosed a cross-site scripting (XSS) vulnerability in the web-based control panel used by operators of the StealC information stealer, allowing them to gather crucial insights on one of the threat actors using the malware in their operations. "By exploiting it, we were able to collect system fingerprints, monitor active sessions, and – in a twist that will 🔗 Source: https://lnkd.in/gXSkKi8f #CyberSecurity #ThreatIntel #InfoSec
To view or add a comment, sign in
-
Don’t miss this insightful breakdown from Jamf Threat Labs on the evolution of MacSync Stealer malware, which now utilizes seemingly legitimate, code-signed Swift applications to deploy harmful scripts, moving away from the previous reliance on Terminal commands. This marks a clever yet perilous shift in macOS security threats: https://okt.to/AH9uCR #CyberSecurity #macOS #Jamf
To view or add a comment, sign in
-
StealC malware panel flaw gives researchers the upper hand: Cybersecurity researchers found a cross‑site scripting (XSS) vulnerability in the control panel used by operators of the StealC info‑stealer malware, allowing defenders to spy on threat actor infrastructure and sessions. https://lnkd.in/e3qCVmfd #cybernews #cybersecurity
To view or add a comment, sign in
-
Fake system crashes are now being used as an active malware delivery technique rather than a scare tactic alone. Recent ClickFix campaigns rely on highly convincing Windows Blue Screen of Death pages that pressure users into “fixing” the problem themselves by running commands provided on screen. This approach removes the need for exploits or vulnerabilities entirely. By shifting execution to the victim and abusing trusted Windows tools, infections often appear legitimate and evade many traditional endpoint defenses. The technique highlights how social engineering continues to outperform technical complexity when attackers understand user behavior. https://lnkd.in/dfh9VTf6 #CyberSecurity #Malware #ThreatIntelligence #InfoSec #SocialEngineering #WindowsSecurity
To view or add a comment, sign in
-
Don't wait for the next malware campaign to audit your security. 👀 We’ve outlined practical steps to lock down your supply chain now: ✅ Switch to phishing-resistant MFA (Passkeys/WebAuthn) ✅ Rotate and scope your tokens ✅ Review third-party access A little security cleanup today can save you from a massive headache tomorrow. 😅 https://lnkd.in/eYrsSZMs
To view or add a comment, sign in
-
A great new year's resolution is to look at security best practices like this to see what you can do to protect your project and your users.
Don't wait for the next malware campaign to audit your security. 👀 We’ve outlined practical steps to lock down your supply chain now: ✅ Switch to phishing-resistant MFA (Passkeys/WebAuthn) ✅ Rotate and scope your tokens ✅ Review third-party access A little security cleanup today can save you from a massive headache tomorrow. 😅 https://lnkd.in/eYrsSZMs
To view or add a comment, sign in
-
the holidays are over, the new year is here - but supply-chain risks didn’t disappear 👀 this post shares a few practical ways to lock things down, worth a read if you missed it the first time around ☺️
Don't wait for the next malware campaign to audit your security. 👀 We’ve outlined practical steps to lock down your supply chain now: ✅ Switch to phishing-resistant MFA (Passkeys/WebAuthn) ✅ Rotate and scope your tokens ✅ Review third-party access A little security cleanup today can save you from a massive headache tomorrow. 😅 https://lnkd.in/eYrsSZMs
To view or add a comment, sign in
-
🔐 This Week in Cyber Researchers uncovered an XSS vulnerability used by StealC malware operators, revealing key details about one of the threat actors. Learn more: https://lnkd.in/gxupBAUz #Malware #CyberSecurity
To view or add a comment, sign in
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development