<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Andreas Dann</title>
    <description>The latest articles on DEV Community by Andreas Dann (@_a_dann).</description>
    <link>https://dev.to/_a_dann</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F676193%2Fef57c5f8-4f2a-4edf-8dd3-90ec46311623.jpg</url>
      <title>DEV Community: Andreas Dann</title>
      <link>https://dev.to/_a_dann</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/_a_dann"/>
    <language>en</language>
    <item>
      <title>Log4JShell ByteCode Detector</title>
      <dc:creator>Andreas Dann</dc:creator>
      <pubDate>Thu, 16 Dec 2021 13:33:59 +0000</pubDate>
      <link>https://dev.to/_a_dann/log4jshell-bytecode-detector-3j87</link>
      <guid>https://dev.to/_a_dann/log4jshell-bytecode-detector-3j87</guid>
      <description>&lt;p&gt;A remote code execution vulnerability has been recently discovered in the popular Java logging framework Log4j affecting versions 2.0-beta9 to 2.15.0, and also some versions of log4j 1.*.&lt;/p&gt;

&lt;p&gt;The vulnerability has been officially disclosed as &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt; but also got some more popular names as &lt;strong&gt;log4Shell&lt;/strong&gt; or &lt;strong&gt;log4jShell&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;As one of the most popular logging frameworks, Log4j has been used in the majority of Java projects. It is important that we quickly assess which projects actually include the vulnerable log4j library, and thus are also vulnerable. &lt;br&gt;
Since hackers are currently actively exploiting, we need to be &lt;strong&gt;fast&lt;/strong&gt; to discover and patch all affected systems. &lt;/p&gt;

&lt;p&gt;This may sound simpler than expected initially, but we frequently do not have access to the source code. This can have many reasons, for instance, the software includes a third-party library for which we don't know if it is affected or we have some legacy software Java systems running, which we can't easily update.  &lt;/p&gt;

&lt;h2&gt;
  
  
  How to check if you are affected -- even if you don't have access to the source code?
&lt;/h2&gt;

&lt;p&gt;To check if your jar file is affected by the critical CVE-2021-44228, we provide an open-source command line tool &lt;a href="https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector"&gt;https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector&lt;/a&gt;. &lt;br&gt;
The tool scans the jar file and compares the classses against a set of pre-computed hashes of the vulnerable Log4j classes.&lt;br&gt;
Since our tool only uses the hash and fingerprints of bytecode classes, &lt;strong&gt;no source code&lt;/strong&gt; needs to be available.&lt;/p&gt;

&lt;p&gt;The hashes have been pre-computed for artifacts on &lt;a href="https://mvnrepository.com/repos/central"&gt;Maven Central&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The set of pre-computed artifacts may not yet be complete, we will update it continuously. Stay tuned.&lt;/p&gt;

&lt;h2&gt;
  
  
  Which artifacts other then log4j-core are actually affected?
&lt;/h2&gt;

&lt;p&gt;We have been working on the topic of Java vulnerability detection for several years now and we are currently applying our technology to further detect more instances of the vulnerability in the wild. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://mvnrepository.com/repos/central"&gt;Maven Central&lt;/a&gt; is one of the largest repositories for Java artifacts, and basically any Java program sources its third-party dependency from there. When installing a dependency, a jar file will be downloaded and included into your software.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The question arises which artifacts are actually affected by the log4jShell vulnerability?&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;This is not a simple question to answer, as source code repositories are not always linked and even if so, the packaging step of a typical Java build may just pack &lt;strong&gt;all dependencies into a single jar, a so-called fatjar&lt;/strong&gt;. Once the vulnerability is part of the jar, the software is affected.&lt;/p&gt;

&lt;p&gt;With our "Fingerprinting" research technology, that we also applied to detect a security vulnerability within the &lt;a href="https://dev.to/blog/2020/06/16/corona_app_scan/"&gt;German Corona-Warn App&lt;/a&gt;, we are able to answer this question. &lt;/p&gt;

&lt;h2&gt;
  
  
  Additional Background and references for CVE-2021-4428
&lt;/h2&gt;

&lt;p&gt;A &lt;strong&gt;remote code execution vulnerability&lt;/strong&gt; has been discovered in log4j versions 2.0-beta9 to 2.14. With an injection attack, an attacker can spawn an own shell and freely access the affected system. There are many references and article out there explaining the details&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html"&gt;Hackernews&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-549032-10F2.pdf?__blob=publicationFile&amp;amp;v=6"&gt;BSI (german only)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/0x0021h/apache-log4j-rce"&gt;Proof of Concept for exploiting the vulnerability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/"&gt;Log4Shell Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Five Common Cloud Security Threats and Data Breaches</title>
      <dc:creator>Andreas Dann</dc:creator>
      <pubDate>Mon, 16 Aug 2021 09:01:39 +0000</pubDate>
      <link>https://dev.to/aws-builders/five-common-cloud-security-threats-and-data-breaches-6n6</link>
      <guid>https://dev.to/aws-builders/five-common-cloud-security-threats-and-data-breaches-6n6</guid>
      <description>&lt;p&gt;In November 2020, an outage of Amazon Web Services (AWS) in the us-east-1 region rendered Roomba vacuum cleaners, Ring doorbells, and even Christmas lights dysfunctional for thousands of people in the US. &lt;br&gt;
For one full day, popular websites like Flickr, Adobe, and the Washington Post were unreachable.&lt;sup id="fnref1"&gt;1&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;It didn't take long for people to tweet about the issue :)&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;My f---ing doorbell doesn't work because AWS us-east-1 is having issues&lt;/p&gt;

&lt;p&gt;I... can't vacuum... because us-east-1 is down&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;While this incident might seem funny at first, it is also a true testament of how extremely dependent we are on cloud computing nowadays.&lt;br&gt;
In fact, within the last 15 years, cloud computing has become a must-have for almost every company developing or using software.&lt;br&gt;&lt;br&gt;
As an increasing number of organizations rely on cloud services or even start shifting to go full cloud-native, cloud security has become a hot topic in the security community.&lt;br&gt;
Unfortunately, the amount of cyberattacks targeting cloud systems has also increased.&lt;/p&gt;

&lt;p&gt;To raise awareness of the threats that lurk in the cloud world, we present in the following &lt;strong&gt;five common security threats in the cloud&lt;/strong&gt; and illustrate their risks with real-world examples.&lt;br&gt;
The five identified threats are based on the Cloud Security Alliance Report &lt;em&gt;Top Threats to Cloud Computing - The Egregious 11&lt;/em&gt;&lt;sup id="fnref2"&gt;2&lt;/sup&gt;, the OWASP &lt;em&gt;Serverless Top 10&lt;/em&gt;&lt;sup id="fnref3"&gt;3&lt;/sup&gt;, and the Cloud Native Computing Foundation &lt;em&gt;Security Whitepaper&lt;/em&gt;&lt;sup id="fnref4"&gt;4&lt;/sup&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cloud-(Security)-Misconfigurations&lt;/li&gt;
&lt;li&gt;Over-Permissioned Cloud Resources&lt;/li&gt;
&lt;li&gt;Insufficient Credential Management&lt;/li&gt;
&lt;li&gt;Insecure APIs &lt;/li&gt;
&lt;li&gt;Using Components with Known Vulnerabilities&lt;/li&gt;
&lt;li&gt;References and Material&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Cloud-(Security)-Misconfigurations
&lt;/h2&gt;

&lt;p&gt;A leading cause of data breaches are cloud (security) misconfigurations, enabling data breaches, or the corruption of company networks.&lt;br&gt;
Cloud resources like micro-services, object and database storage solutions, or networking components are the subject of such misconfiguration.&lt;br&gt;
Typical examples of misconfigurations are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;unencrypted data storage or containers&lt;/li&gt;
&lt;li&gt;publicly accessible data storage&lt;/li&gt;
&lt;li&gt;open SSH or database ports&lt;/li&gt;
&lt;li&gt;using default credentials&lt;/li&gt;
&lt;li&gt;too open firewall and security group settings&lt;/li&gt;
&lt;li&gt;deactivated security controls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Such issues are a concern in cloud environments as in any other architecture. &lt;br&gt;
Nevertheless, the fast pace at which cloud infrastructure regularly changes, makes it difficult to find and control these issues.&lt;br&gt;
Whereas in traditional applications changes in the infrastructure and assets involved multiple roles and approvals to reach production, the cloud infrastructure is much more flexible and dynamic.&lt;br&gt;
Modern technologies and tools for provisioning, maintaining, and changing an infrastructure like Infrastructure-as-Code enable rapid changes in the infrastructure.&lt;/p&gt;

&lt;p&gt;The use of multiple cloud providers and the combination of private and public clouds, surely does not make tracking down misconfigurations easy.&lt;/p&gt;

&lt;p&gt;Since misconfigurations are easy to make but difficult to spot in complex cloud environments, they are the root cause of several recent and massive data breaches.&lt;br&gt;
In the following, we can only present a small subset of data breaches showing the impact of misconfigurations.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;In 2018, an unsecured Elasticsearch database of the marketing company Exactis exposed nearly 340 million individual records containing personal information of American adults as well as millions of businesses.&lt;br&gt;
The database server was erroneously configured to be publicly accessible. &lt;sup id="fnref5"&gt;5&lt;/sup&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In 2019, the personal information of thousands of hotel guests including members of the US government and military was publicly exposed due to an open Elasticsearch database of AutClerk, which is a combined reservations system for hotels, accommodation providers, travel agencies.&lt;br&gt;
&lt;sup id="fnref6"&gt;6&lt;/sup&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In 2020, the personal and payment information of 7 million users of the mobile payment app Bharat Interface Money (BHIM) was exposed.&lt;br&gt;
The breach was caused by a misconfigured AWS S3 bucket.  In fact, user data was stored unencrypted on a &lt;strong&gt;publicly&lt;/strong&gt; accessible S3 bucket, making it vulnerable to misuse for frauds and theft. &lt;sup id="fnref7"&gt;7&lt;/sup&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In 2020, the companies Advantage Capital Funding and Argus Capital Funding didn’t set up encryption, authentication, or access credentials for their database, which contained highly sensitive financial and personal data.&lt;br&gt;
As a result, almost half a million gigabytes of confidential legal and financial documents were leaked.&lt;sup id="fnref8"&gt;8&lt;/sup&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Over-Permissioned Cloud Resources
&lt;/h2&gt;

&lt;p&gt;Even a simple cloud-native application can consist of dozens or hundreds of micro-services.&lt;br&gt;
Each reading, writing, and updating different databases, object storages, data streams, and APIs.&lt;br&gt;
A secure orchestration of the micro-services and assets requires a careful access control configuration for each of the resources, which is tedious. &lt;br&gt;
However, attackers target over-permissioned cloud resources to escalate their privileges and to gain unauthorized access to other resources in the account rather than having control over these resources directly.&lt;br&gt;
Unnecessary cloud resources or excessive permissions on resources are a potential backdoor that can lead to data leakage from not only the over-permissioned resources themselves but also from their related resources. &lt;br&gt;
And, in the worst-case, may even give an attacker full control over cloud resources or the whole account.&lt;/p&gt;

&lt;p&gt;An example in which an over-permissioned cloud resource caused a massive data breach is the Capital One hack.&lt;br&gt;
In 2019, an attacker gained access to 80,000 account numbers, 140,000 Social Security numbers, 1 million Canadian Social Insurance Numbers by abusing an over-permissioned web application firewall (WAF).&lt;/p&gt;

&lt;p&gt;By abusing the over-permissioned WAF the attacker could craft a Server-Side-Request Forgery (SSRF) attack to steal the data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjj0wc8ls6456dp8ikrf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjj0wc8ls6456dp8ikrf.png" alt="Capital One Hack based on MIT Report"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The attack involved multiple steps visualized in the figure and described in a report of the MIT &lt;sup id="fnref9"&gt;9&lt;/sup&gt;, which we cite here: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The FBI and Capital One identified several accesses through anonymizing services such as TOR Network and VPN service provider IPredator, both used to hide the source IP address of the malicious accesses; 

&lt;ol&gt;
&lt;li&gt;The SSRF attack allowed the criminal to trick the server into executing commands as a remote user, which gave the attacker access to a private server.&lt;/li&gt;
&lt;li&gt;The WAF misconfiguration allowed the intruder to trick the firewall into relaying commands to a default back-end resource on the AWS platform, known as the metadata service with temporary credentials for such environment (accessed through the URL &lt;a href="http://169.254.169.254" rel="noopener noreferrer"&gt;http://169.254.169.254&lt;/a&gt;); &lt;/li&gt;
&lt;li&gt;By combining the SSRF attack and the WAF misconfiguration, the attacker used the URL “&lt;a href="http://169.254.169.254/iam/security-credentials%E2%80%9D" rel="noopener noreferrer"&gt;http://169.254.169.254/iam/security-credentials”&lt;/a&gt; to obtain the AccessKeyId and SecretAccessKey credentials from a role described in the FBI indictment as “*****-WAF-Role” (name was partially redacted). The resulting temporary credentials allowed the criminal to run commands in AWS environment via API, CLI or SDK; &lt;/li&gt;
&lt;li&gt;By using the credentials, the attacker ran the “ls” command7 multiple times, which returned a complete list of all AWS S3 Buckets of the compromised Capital One account ("$ aws s3 ls"); &lt;/li&gt;
&lt;li&gt;Lastly, the attacker used the AWS “sync” command8 to copy nearly 30 GB of Capital One credit application data from these buckets to the local machine of the attacker ("$ aws s3 sync s3://bucketone."). This command gave the attacker access to more than 700 buckets, according to the FBI report.&lt;sup id="fnref9"&gt;9&lt;/sup&gt;
&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ol&gt;

&lt;h2&gt;
  
  
  Insufficient Credential Management
&lt;/h2&gt;

&lt;p&gt;One of the biggest threats to cloud security is human error when handling credentials or sensitive information.&lt;br&gt;
Sensitive data like secrets, access tokens, and passwords can be accidentally uploaded to a Git repo, put on a public bucket, or even hardcoded in application code.&lt;br&gt;
Since cloud systems are often globally and publicly available, stolen credentials can be easily abused by attackers.&lt;br&gt;
Typical examples are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Insufficient protection of credentials, like encryption&lt;/li&gt;
&lt;li&gt;Use of weak passwords&lt;/li&gt;
&lt;li&gt;No automatic rotation of keys, passwords, and certificates&lt;/li&gt;
&lt;li&gt;No use of multi-factor authentication&lt;/li&gt;
&lt;li&gt;Storing credentials in Version Control Systems, Source-Code, or Environment Variables&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In 2014, attackers scraped public GitHub repositories for cloud service credentials and hijacked accounts to mine cryptocurrency at other people's expense.&lt;br&gt;
The attackers were able to discover and misuse the cloud service provider credentials within 36 hours of the credentials being pushed to GitHub accidentally.&lt;sup id="fnref10"&gt;10&lt;/sup&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Insecure APIs
&lt;/h2&gt;

&lt;p&gt;Almost every cloud application exposes its services in the form of APIs or UIs.&lt;br&gt;
Since they act as the &lt;em&gt;front door&lt;/em&gt; of the system, they are attacked and scanned continuously.&lt;br&gt;
Thus, the API of each system must follow established security guidelines and all APIs must be protected by adequate means of authentication and authorization.&lt;/p&gt;

&lt;p&gt;In 2018, Facebook experienced a breach that affected more than 50 million accounts that was the result of a credential theft vulnerability introduced as a feature back in 2017.&lt;br&gt;
Facebook admitted that it didn’t know what information was stolen, nor how many user accounts were compromised.&lt;/p&gt;

&lt;h2&gt;
  
  
  Using Components with Known Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;This threat is neither bound to cloud applications nor cloud environments, but a general threat every application developer and security expert should be aware of.&lt;br&gt;
Nowadays, applications are not re-written from scratch but contain a sustainable amount of third-party/open-source libraries and frameworks to execute the desired tasks.&lt;br&gt;
Even for commercial applications easily as much as 75% of the code comes from open-source libraries and frameworks.&lt;sup id="fnref11"&gt;11&lt;/sup&gt;&lt;br&gt;
Vulnerabilities in the used (open-source) components are a common risk these days and attackers will target applications that make use of vulnerabilities in included open-source components, &lt;br&gt;
as they are easy to exploit - often even publicly accessible exploits exist.&lt;/p&gt;

&lt;p&gt;An (in)famous example, which shows the impact of vulnerable libraries, is the data breach of the largest consumer credit reporting agency Equifax in 2017 &lt;sup id="fnref12"&gt;12&lt;/sup&gt;&lt;sup id="fnref13"&gt;13&lt;/sup&gt;. &lt;br&gt;
Attackers exploited a vulnerability (CVE-2017-5638) in the open-source framework Apache Struts2 - which had already been patched but which Equifax had not updated on their server, to gain access to the corporate network.&lt;br&gt;
The attackers pulled personal data including Social Security numbers, birth dates, and residential addresses of an estimated 152 million American, 44 million British, and 8000 Canadian residents.&lt;br&gt;
In the end, the data breach cost Equifax more than 1.7 billion US dollar and Equifax's Chief Security Officer (CSO) and Chief Information Officer (CIO) resigned.&lt;/p&gt;

&lt;h2&gt;
  
  
  About the Author
&lt;/h2&gt;

&lt;p&gt;Andreas Dann is a co-founder of &lt;a href="https://codeshield.io" rel="noopener noreferrer"&gt;CodeShield&lt;/a&gt;, a context-aware cloud-native security tool. Before, Andreas worked as a researcher software composition analysis to detect, assess, and mitigate vulnerabilities in included open-source libraries at the Secure Software Engineering group at Paderborn University. Andreas is one of the main contributors of &lt;a href="https://github.com/soot-oss/soot" rel="noopener noreferrer"&gt;Soot&lt;/a&gt;, an open-source static program analysis framework for Java.&lt;/p&gt;

&lt;h2&gt;
  
  
  References and Material
&lt;/h2&gt;




&lt;ol&gt;

&lt;li id="fn1"&gt;
&lt;p&gt;&lt;a href="https://www.dailymail.co.uk/sciencetech/article-8994907/Widespread-Amazon-cloud-service-outage-disables-Roombas-Ring-doorbells-Christmas-lights.html" rel="noopener noreferrer"&gt;https://www.dailymail.co.uk/sciencetech/article-8994907/Widespread-Amazon-cloud-service-outage-disables-Roombas-Ring-doorbells-Christmas-lights.html&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn2"&gt;
&lt;p&gt;Cloud Security Alliance (CSA), Report 2020, Top Threats to Cloud Computing - The Egregious 11 ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn3"&gt;
&lt;p&gt;&lt;a href="https://owasp.org/www-project-serverless-top-10/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-serverless-top-10/&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn4"&gt;
&lt;p&gt;Cloud Native Computing Foundation (CNCF), Report 2020, Security Whitepaper ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn5"&gt;
&lt;p&gt;&lt;a href="https://www.wired.com/story/exactis-database-leak-340-million-records/" rel="noopener noreferrer"&gt;https://www.wired.com/story/exactis-database-leak-340-million-records/&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn6"&gt;
&lt;p&gt;&lt;a href="https://www.itpro.co.uk/security/34671/us-military-data-exposed-in-179gb-autoclerk-leak" rel="noopener noreferrer"&gt;https://www.itpro.co.uk/security/34671/us-military-data-exposed-in-179gb-autoclerk-leak&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn7"&gt;
&lt;p&gt;&lt;a href="https://www.newindianexpress.com/nation/2020/jun/01/hackers-claim-to-have-found-vulnerability-in-bhim-app-npci-denies-data-compromise-2150840.html" rel="noopener noreferrer"&gt;https://www.newindianexpress.com/nation/2020/jun/01/hackers-claim-to-have-found-vulnerability-in-bhim-app-npci-denies-data-compromise-2150840.html&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn8"&gt;
&lt;p&gt;&lt;a href="https://www.zdnet.com/article/financial-apps-leak-425gb-in-company-data-through-open-database/" rel="noopener noreferrer"&gt;https://www.zdnet.com/article/financial-apps-leak-425gb-in-company-data-through-open-database/&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn9"&gt;
&lt;p&gt;MIT, A Case Study of the Capital One Data Breach, &lt;a href="http://web.mit.edu/smadnick/www/wp/2020-16.pdf" rel="noopener noreferrer"&gt;http://web.mit.edu/smadnick/www/wp/2020-16.pdf&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn10"&gt;
&lt;p&gt;&lt;a href="https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/" rel="noopener noreferrer"&gt;https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn11"&gt;
&lt;p&gt;L. Heinemann et al. On the extent and nature of software reuse in open source java projects ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn12"&gt;
&lt;p&gt;&lt;a href="https://krebsonsecurity.com/tag/equifax-breach/" rel="noopener noreferrer"&gt;https://krebsonsecurity.com/tag/equifax-breach/&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn13"&gt;
&lt;p&gt;&lt;a href="https://medium.com/cloud-security/cves-security-vulnerabilities-1830aee64904" rel="noopener noreferrer"&gt;https://medium.com/cloud-security/cves-security-vulnerabilities-1830aee64904&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

</description>
      <category>cloudnative</category>
      <category>security</category>
      <category>cloudsecurity</category>
    </item>
  </channel>
</rss>
