No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Cisco Disables DevHub Access After Security Breach

October 21, 2024
in Protection
0
Cisco Disables DevHub Access After Security Breach


Cisco has disabled public access to one of its DevHub environments after threat actors downloaded some customer data from the site and put it up for sale on a cybercrime forum.

The compromised data included source code, API tokens, hardcoded credentials, certificates, and other secrets belonging to some large companies, including Microsoft, Verizon, T-Mobile, AT&T, Barclays, and SAP.

Data Heist From Public-Facing Environment

News of the breach first surfaced a week ago, when researchers spotted three threat actors using the monikers IntelBroker, EnergyWeaponUser, and zjj, putting up the data for sale on BreachForums. IntelBroker is a known Serbian entity that began operations in 2022 and is linked to several major data heists, including ones at Europol, General Electric, and DARPA (Defense Advanced Research Projects Agency).

Cisco announced it was investigating the incident on Oct. 15. Three days later, the company confirmed the security incident in an update that offered little detail on the kind of data that the attackers managed to access and download.

Cisco’s own systems appear not to have been affected in the incident. “We have determined that the data in question is on a public-facing DevHub environment — a Cisco resource center that enables us to support our community by making available software code, scripts, etc. for customers to use as needed,” Cisco’s advisory noted. “At this stage in our investigation, we have determined that a small number of files that were not authorized for public download may have been published.”

The company said that, at the moment, there is no evidence the attackers illegally accessed any personal identity data or financial information, but it added that it was still investigating that possibility. “Out of an abundance of caution, we have disabled public access to the site while we continue the investigation,” the company said.

In their BreachForums post, the threat actors claimed the data they downloaded from Cisco’s DevHub site included GitHub and GitLab projects, source code, Jira tickets, container images, data from AWS storage buckets, and at least some confidential Cisco information.

Reminder: The Need to Secure Public-Facing Assets

The Cisco incident is a reminder why organizations need to protect public-facing environments with measures like input validation to protect against injection attacks, strong authentication tools and processes, and regular vulnerability assessments, says Jason Soroko, senior fellow at Sectigo.

Common mistakes organizations make when it comes to securing their public-facing assets include neglecting OWASP guidelines, underestimating security risks, failing to update systems regularly, and not prioritizing secure coding practices, Soroko says: “Don’t forget to back up your website code and practice restoring it. Malware detection tools are available that make it easy to regularly scan.”

Organizations can sometimes tend to perceive their public-facing assets as less critical when, in reality, they can expose sensitive information that attackers could use for future intrusions, he adds. The data that the attackers obtained in the Cisco incident, for instance, included source code, API tokens, certificates, and credentials that attackers could potentially leverage in a significant way in a future campaign.

Eric Schwake, director of cybersecurity strategy at Salt Security, says various factors contribute to sensitive data ending up on an organization’s public-facing environments. “This can occur due to accidental misconfigurations of access controls, human errors in code or file management, inadequate security testing before deployment, or the compromise of third-party services,” he says. These oversights can lead to the exposure of sensitive data and create potential entry points for attackers.

Schwake recommends that organizations implement a multilayered security strategy to reduce this risk. “This involves enforcing strict access controls, promoting secure coding practices, conducting thorough security testing, building posture governance standards, and performing regular security assessments,” he says. “Using secrets management solutions and continuous monitoring tools can further improve security and protect against unauthorized access to sensitive information.”



Editorial Team

Editorial Team

Related Posts

The Best Amazon Prime Benefits You Probably Don't Know About
Protection

The Best Amazon Prime Benefits You Probably Don’t Know About

November 19, 2025
Google's Desktop Search App Is Back (Kind Of)
Protection

Google’s Desktop Search App Is Back (Kind Of)

November 19, 2025
Use This New TikTok Tool to Control How Much AI Is in Your Feed
Protection

Use This New TikTok Tool to Control How Much AI Is in Your Feed

November 19, 2025
The iPad Has Never Been More Like a Mac, but Can It Replace One?
Protection

The iPad Has Never Been More Like a Mac, but Can It Replace One?

November 19, 2025
This Samsung Galaxy Tab S10+ Is Already $250 Off for Black Friday
Protection

This Samsung Galaxy Tab S10+ Is Already $250 Off for Black Friday

November 19, 2025
Google's New Gemini Pro Features Are Out, but Most of Them Will Cost You
Protection

Google’s New Gemini Pro Features Are Out, but Most of Them Will Cost You

November 19, 2025
Load More
Next Post
Condé Nast Traveler

41 Best NYC Gifts That Aren't an “I Heart NY” T-Shirt

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • Cash Sweep Accounts vs. Money Market Funds, HYSAs & CDs

    0 shares
    Share 0 Tweet 0
  • Amtrak’s Roomette vs. Bedroom vs. Family Room

    0 shares
    Share 0 Tweet 0
  • Alternative Credit Awards on track to sell out

    0 shares
    Share 0 Tweet 0

Latest News

Samourai Wallet's William Hill receives 4-year sentence for money laundering involvement

Samourai Wallet’s William Hill receives 4-year sentence for money laundering involvement

November 19, 2025
0

Key Takeaways William Hill, co-founder of Samourai Wallet, was sentenced to four years in prison for his involvement in money...

Access Restricted

Access Restricted

November 19, 2025
0

Access Restricted Associated Newspapers Ltd Access Restricted Thank you for your interest. Unauthorised access is prohibited. To access this content,...

Client Challenge

Client Challenge

November 19, 2025
0

Client Challenge JavaScript is disabled in your browser. Please enable JavaScript to proceed. A required part of this site couldn’t...

The Best Amazon Prime Benefits You Probably Don't Know About

The Best Amazon Prime Benefits You Probably Don’t Know About

November 19, 2025
0

We may earn a commission from links on this page. If you’re going to commit to an Amazon Prime membership,...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.