Homepage
Open in app
Sign in
Get started
Cider Security
Blog posts from Cider Security’s R&D and leadership teams. Topics include: CI/CD Pipelines, DevOps, DevSecOps, Vulnerabilities, Cybersecurity, Entrepreneurship, and more.
Follow
Exploiting Jenkins build authorization
Exploiting Jenkins build authorization
Are you aware of the risks lurking in your default Jenkins configuration?
Asi Greenholts
Feb 17, 2022
PPE — Poisoned Pipeline Execution
PPE — Poisoned Pipeline Execution
Running malicious code in your CI, without access to your CI
Omer Gil
Feb 8, 2022
Secret Diver — Searching for deeply hidden secrets
Secret Diver — Searching for deeply hidden secrets
We are glad to introduce Secret Diver, a tool that allows you to search inside Docker layers for secrets.
Rotem Bar
Jan 19, 2022
Visualizing CI/CD from an attacker’s perspective
Visualizing CI/CD from an attacker’s perspective
Lessons learned and insight gained from a year of modeling and engineering CI/CD graphs
Leon Goldberg
Jan 10, 2022
NPM might be executing malicious code in your CI without your knowledge
NPM might be executing malicious code in your CI without your knowledge
How to tell if you are using NPM safely within your CI
Rotem Bar
Jan 3, 2022
Optimizing your resilience against Log4Shell
Optimizing your resilience against Log4Shell
Collection of actionable measures — across Prevention, Mitigation, Detection and assessment — for coping with the Log4Shell chaos
Cider Security
Dec 13, 2021
Our dependencies are under attack, and this time we were lucky…
Our dependencies are under attack, and this time we were lucky…
How can we protect ourselves when our world infrastructure is under attack?
Rotem Bar
Nov 23, 2021
About Cider Security
Latest Stories
Archive
About Medium
Terms
Privacy
Teams