๐˜‘๐˜ฐ๐˜ฉ๐˜ฏ ๐˜๐˜ช๐˜ญ๐˜ฆ๐˜ด

6.7K posts

๐˜‘๐˜ฐ๐˜ฉ๐˜ฏ ๐˜๐˜ช๐˜ญ๐˜ฆ๐˜ด banner
๐˜‘๐˜ฐ๐˜ฉ๐˜ฏ ๐˜๐˜ช๐˜ญ๐˜ฆ๐˜ด

๐˜‘๐˜ฐ๐˜ฉ๐˜ฏ ๐˜๐˜ช๐˜ญ๐˜ฆ๐˜ด

@JohnFiles_

๐˜—๐˜ฆ๐˜ฏ๐˜ต๐˜ฆ๐˜ด๐˜ต๐˜ฆ๐˜ณ | ๐˜›๐˜ฆ๐˜ค๐˜ฉ ๐˜Ž๐˜ถ๐˜บ | ๐˜š๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜›๐˜ช๐˜ฎ๐˜ฆ | ๐˜™๐˜ฆ๐˜ฅ๐˜ข๐˜ค๐˜ต๐˜ฆ๐˜ฅ | ๐˜Š๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฆ

Katฤฑlฤฑm Eylรผl 2024
306 Takip Edilen30.2K Takipรงiler
๐˜‘๐˜ฐ๐˜ฉ๐˜ฏ ๐˜๐˜ช๐˜ญ๐˜ฆ๐˜ด
TeamPCP actually open-sourced their own Shai-Hulud worm on GitHub under the MIT license >tracked as UNC6780 by Googleโ€™s Threat Intelligence Group > from compromising a vulnerability scanner in March to breaching GitHubโ€™s internal codebase in May > Each breach gave them credentials to fund the next attack. Thatโ€™s not opportunistic hacking, thatโ€™s a deliberate campaign with a clear endpoint target. GitHub was almost certainly the endgame from the start.
GitHub@github

We are investigating unauthorized access to GitHubโ€™s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHubโ€™s internal repositories (such as our customersโ€™ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity.

English
0
0
0
563