Google Cloud Build Vulnerable to Supply Chain Attacks

Security Researchers have discovered a design flaw in Google Cloud Build which can allow for supply chain attacks. Google Cloud Build is Google Cloud’s managed continuous integration and delivery service. This CI/CD service allows users to automate the process...

Thousands of Container Images Leaking Secrets

Researchers from a German university recently published a paper revealing that tens of thousands of container images hosted on Docker Hub contain confidential secrets. Docker Hub is an online repository for docker container images. And a docker container image is a...

What’s Your Social Media OpSec?

Sharing on social media is a good way to keep in touch with friends, but sometimes that can get you in trouble. A Russian Naval officer was recently killed near his home and it was believed that he may have been tracked on the Strava App. Strava is a social fitness...

Spike in Attacks Using Infected USB Drives

Do using USB drivers as an initial infection vector still work today? Well, what is old is new again and security researchers at Mandiant have observed a threefold increase in the number of attacks using infected USB drives to steal secrets. The increase is attributed...

Account Takeovers using Evil QR

Logging in via QR code is something that more websites are starting to embrace. Some of those websites include Discord, Telegram, Whatsapp, Steam and Tiktok. Rather than having to enter a username/password in the website, you use the application’s mobile app to...

NSW Cashless Gaming Trial Terminated Due to Ransomware Attack

The NSW Cashless gambling trial suffered a setback recently when its suffered a cyber-attack.  According to the government, Australians have a gambling problem. We spend and lose more money gambling across all formats compared to any other country in the world....

Is Your Solar System Compromising Your Home Network?

As more households embrace green energy and install solar panels, they could unknowingly be exposing their home networks. Most of the solar systems include apps which can be used to track the efficiency of your solar generation. Your home solar system would be...

Spyware in Google Play Store Stealing Users’ Data

Security researchers have discovered two spyware in the Google Play Store that have been installed by up to 1.5 million users. Both apps are from the same publisher and pose as file management applications. They have similar malicious behaviours such as launching...