CyberArkLabs

75 Followers
1 Following
60 Posts
The official Mastodon account for CyberArk
Labs news and updates from our threat research team. #CyberSecurity

🔍Researcher Eviatar Gerzi uncovered 2 vulnerabilities in #Portainer! 🛡️

Learn how #CodeQL helped identify a blind SSRF and insecure encryption in this popular container management tool.

Read the full analysis here:

https://www.cyberark.com/resources/threat-research-blog/discovering-hidden-vulnerabilities-in-portainer-with-codeql

Discovering Hidden Vulnerabilities in Portainer with CodeQL

Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly...

I'm really looking forward to this weekend and @BSidesDFW. I'm putting the finishing touches on my lab exercises. I'm also giving the UNCENCORED version of my #SocialEngineering presentation.

https://bsides.org/w/page/157573620/DFW_2024

BSides / DFW_2024

Principal researcher Shaked Reiner just published this eye-opening article about a security vulnerability in #LargeLanguageModels (#LLMs ) that allowed him to execute arbitrary code on a server through a simple chat prompt.

https://www.cyberark.com/resources/threat-research-blog/anatomy-of-an-llm-rce

#RCE #ArtificialIntelligence #AI

Anatomy of an LLM RCE

As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...

🚨Azure DevOps Users: Is Your Pipeline Secure?🚨

A must-read security analysis by Eviatar Gerzi reveals potential vulnerabilities in Azure DevOps job execution. This comprehensive blog post is a wake-up call for anyone using Azure Pipelines in their development process.

What you'll learn:

âś… How Azure DevOps pipelines really work behind the scenes
⚠️ Security risks in self-hosted agents
🔑 Ways attackers could escalate privileges
🛡️ Best practices to secure your pipelines
Protect your projects and stay ahead of potential threats.

Share your thoughts and experiences in the comments below!

https://www.cyberark.com/resources/threat-research-blog/a-security-analysis-of-azure-devops-job-execution

A Security Analysis of Azure DevOps Job Execution

In software development, CI/CD practices are now standard, helping to move code quickly and efficiently from development to production. Azure DevOps, previously known as Team Foundation Server...

🤖LLMs can be manipulated to execute harmful commands. New research reveals critical security flaws in popular AI models. Learn how you can manipulate AI to execute malicious commands in this must-read article by Shaked Reiner.

https://www.cyberark.com/resources/threat-research-blog/ai-treason-the-enemy-within

AI Treason: The Enemy Within

tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...

Check out how a gaming cheat dev gets caught bundling an infostealer in his code, and then gets ratted out by his coworker!

https://www.youtube.com/watch?v=jiV6Li-tJQA

Tarkov Cheat Dev Commits Identity Theft & Gets Exposed by His Co-worker

YouTube

🤔Curious about the history and evolution of video game cheating? 🤔

Our latest blog, Devid El covers everything from built-in cheats to advanced DMA methods. Discover how developers fight back and the risks involved.

Read more here: https://www.cyberark.com/resources/threat-research-blog/a-brief-history-of-game-cheating

A Brief History of Game Cheating

Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...

🚨 NEW BLOG POST 🚨

In an astonishing turn of events, a cheat developer for the popular game #EscapeFromTarkov was caught embedding information-stealing malware in his software.

Read our detailed analysis to learn more about this double-dipping scandal and its consequences.

đź”—https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed

Double Dipping Cheat Developer Gets Caught Red-Handed

Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...

"When ChatGPT hit the public in late 2022, it triggered a spate of references to Skynet. While it’s still a far cry from the dystopian surveillance neural network in the movie Terminator, it does pose unique security challenges that need to be grappled with." @Andy_Thompson

https://www.securityinfowatch.com/cybersecurity/article/55127852/lessons-from-skynet-or-why-your-ai-identities-need-governance-and-least-privilege

Lessons from Skynet, or why your AI identities need governance and least privilege

As AI entities become more autonomous and gain access to more sensitive data and systems, CISOs stand to face their own cybersecurity crisis.

Security Info Watch

Local Privilege Escalation vulnerability found (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic Privilege Manager).

https://www.cyberark.com/resources/threat-research-blog/identity-crisis-the-curious-case-of-a-delinea-local-privilege-escalation-vulnerability

Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic...