Skip to content
  Friday 17 April 2026
Trending
January 2, 20228 Best Free Sports Streaming Websites For 2022 (Legal and Safe) February 11, 2025<h3>Altman Snubs Musk’s $97 Billion Bid for OpenAI</h3> November 7, 2024SteelFox and Rhadamanthys: Malware Masters Targeting Victims with Copyright Scams and Driver Exploits February 12, 2024Principal Cybersecurity Analyst ( AppSec ) May 12, 2024CYBERSECURITY ENGINEER March 23, 2024Cybersecurity Defensive Operations – Technical May 8, 2025<h3>Patient Monitor Maker Battles Back After Cyber Attack</h3> October 30, 2023Cybersecurity Specialist June 29, 20232023 CWE Top 25 Most Dangerous Software Weaknesses November 15, 2024Caution: Google’s Vertex AI ML Platform at Risk of Privilege Escalation
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  CISA Issues Urgent Alert on GitHub Action Supply Chain Attack
Industry News

CISA Issues Urgent Alert on GitHub Action Supply Chain Attack

SecuredyouadmSecuredyouadm—March 19, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Taiwan Targeted by Unidentified Cyberespionage Group

October 10, 2023

Researchers Point Out Vulnerability of Google’s Gemini AI to LLM Attacks

March 13, 2024

Check Point Acquires Veriti to Boost Threat Management

May 27, 2025

Massive Hack Hits Nationwide Recovery Service, Impacting Half a Million Victims!

June 26, 2025



On March 19, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) identified a vulnerability associated with the supply chain compromise of the GitHub Action, tj-actions/changed-files. This vulnerability, known as CVE-2025-30066 with a CVSS score of 8.6, allows remote attackers to access sensitive data via actions logs by injecting malicious code into the GitHub Action.

The compromised GitHub Action contained a flaw that enabled attackers to discover secrets stored in actions logs, including AWS access keys, GitHub personal access tokens, npm tokens, and private RSA keys. Cloud security company Wiz uncovered that this attack may have been part of a cascading supply chain compromise, with threat actors first compromising the reviewdog/action-setup@v1 GitHub Action to infiltrate tj-actions/changed-files.

The attack occurred on March 11, 2025, with the tj-actions/changed-files repository being breached before March 14. The infected reviewdog action was used to insert a Base64-encoded payload into CI/CD workflows, exposing secrets from repositories running the workflow in logs. The maintainers of tj-actions attributed the attack to a compromised Github Personal Access Token (PAT) that allowed unauthorized modification of the repository with malicious code.

In response to the compromise, affected users and federal agencies are urged to update to the latest version of tj-actions/changed-files (46.0.1) by April 4, 2025, to mitigate active threats. Additionally, users are advised to audit past workflows for suspicious activity, rotate any leaked secrets, and pin all GitHub Actions to specific commit hashes instead of version tags to prevent similar incidents in the future.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

US DOGE Staffer Leaks Sensitive Treasury Data via Unencrypted Email

URGENT: Vulnerabilities in mySCADA myPRO Could Lead to Industrial Control System Hijacking
Related posts
  • Related posts
  • More from author
Industry News

AI Is Transforming EDI Compliance Services

March 27, 20260
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Horner Automation Cscape and XL4, XL7 PLC

April 17, 20260
Threat Advisories

Delta Electronics ASDA-Soft | CISA

April 16, 20260
Threat Advisories

Anviz Multiple Products | CISA

April 16, 20260
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

April 16, 20260
Threat Advisories

AVEVA Pipeline Simulation | CISA

April 16, 20260
Careers

COORDINATOR OF NETWORK, CYBERSECURITY AND IT INFRASTRUCTURE

April 16, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Horner Automation Cscape and XL4, XL7 PLC
  • Delta Electronics ASDA-Soft | CISA
  • Anviz Multiple Products | CISA
  • CISA Adds One Known Exploited Vulnerability to Catalog
  • AVEVA Pipeline Simulation | CISA

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures