Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Customize Your GitGuardian Remediation Workflow

Have you ever wished you could customize the remediation workflow in your GitGuardian workspace? Now, you can! As a workspace Manager, you can manage the remediation workflow in the Secrets detection section of your settings and add up to 20 steps. You can also switch between the default GitGuardian remediation workflow and your custom remediation workflow.

Automating incident Remediation with GitGuardian Playbooks

GitGuardian can help automate your incident remediation process through our playbooks! The auto-healing playbook automates sharing the incident with the developer involved. Whenever a new incident is detected, GitGuardian automatically turns on the sharing option of the incident and, in most cases, sends an email with the unique link to the developer involved.

Warning: Sharing Data with ChatGPT Can Be Misused Outside Your Organization

A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls in place to protect who can retrieve it. The frenzy to take advantage of ChatGPT and other AI platforms like it has likely caused some to feed it plenty of corporate data in an effort to have the AI process and provide insightful output based on the queries received.

CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Actively Exploited in the Wild

On May 31, 2023, Progress released a security advisory warning customers of a critical zero-day vulnerability being actively exploited in MOVEit Transfer, a managed file transfer (MFT) solution. The exploitation of this vulnerability could lead to escalated privileges and potential unauthorized access to an environment, allowing threat actors to steal data and extort organizations.

CVE-2023-33733: RCE Vulnerability in ReportLab PDF Toolkit

On May 31st, 2023, a working exploit has been publicly released for a remote code execution (RCE) vulnerability (CVE-2023-33733), impacting ReportLab PDF Toolkit python libraries of versions prior to 3.6.13. The researcher of the POC has previously contacted ReportLab in April 2023, detailing this vulnerability and ReportLab has released a fix on April 27th, 2023, through ReportLab 3.6.13.

Netskope Threat Coverage: MOVEit Transfer Zero-Day

A new critical zero-day vulnerability in the MOVEit Transfer software is being actively exploited by attackers to exfiltrate data from organizations. MOVEit Transfer is a managed file transfer (MFT) software, developed by Progress, designed to provide organizations a way to securely transfer files, which can be implemented on-premise or as a cloud SaaS platform. According to BleepingComputer, attackers have been actively exploiting MOVEit Transfer to download data from organizations.