FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

The time has come: GitHub expands 2FA requirement rollout March 13

A GitHub-made image accompanying all the company's communications about 2FA.

Enlarge / A GitHub-made image accompanying all the company's communications about 2FA. (credit: GitHub)

Software development tool GitHub will require more accounts to enable two-factor authentication (2FA) starting on March 13. That mandate will extend to all developers who contribute code on GitHub.com by the end of 2023.

GitHub announced its plan to roll out a 2FA requirement in a blog post last May. At that time, the company's chief security officer said that it was making the move because GitHub (which is used by millions of software developers around the world across myriad industries) is a vital part of the software supply chain. Said supply chain has been subject to several attacks in recent years and months, and 2FA is a strong defense against social engineering and other particularly common methods of attack.

When that blog post was written, GitHub revealed that only around 16.5 percent of active GitHub users used 2FAโ€”far lower than you'd expect from technologists who ought to know the value of it.

Read 6 remaining paragraphs | Comments

GitHub says hackers cloned code-signing certificates in breached repository

zeros and ones illustrating binary code

Enlarge

GitHub said unknown intruders gained unauthorized access to some of its code repositories and stole code-signing certificates for two of its desktop applications: Desktop and Atom.

Code-signing certificates place a cryptographic stamp on code to verify it was developed by the listed organization, which in this case is GitHub. If decrypted, the certificates could allow an attacker to sign unofficial versions of the apps that had been maliciously tampered with and pass them off as legitimate updates from GitHub. Current versions of Desktop and Atom are unaffected by the credential theft.

โ€œA set of encrypted code signing certificates were exfiltrated; however, the certificates were password-protected and we have no evidence of malicious use,โ€ the company wrote in an advisory. โ€œAs a preventative measure, we will revoke the exposed certificates used for the GitHub Desktop and Atom applications.โ€

Read 10 remaining paragraphs | Comments

โŒ