comparemela.com
Home
Live Updates
Poisoned pipelines: Security researcher explores attack methods in CI environments : comparemela.com
Poisoned pipelines: Security researcher explores attack methods in CI environments
Attack vector abuses permissions to force CI pipelines to execute arbitrary commands
Related Keywords
Travis Biehn
,
Homer Gil
,
Theresa Lanowitz
,
Indigo Design Shutterstock Portswigger Ltd
,
Synopsys Software Integrity Group
,
European Union Agency For Cybersecurity
,
Indigo Design
,
Cider Security
,
European Union Agency
,
Poisoned Pipeline Execution
,
Github Actions
,
Daily Swig
,
comparemela.com © 2020. All Rights Reserved.