Dec. 21, 2023, 4:13 p.m. | jpmellojr@gmail.com (John P. Mello Jr.)

ReversingLabs Blog blog.reversinglabs.com



The group that perpetrated the notorious SunBurst attack on SolarWinds in 2020 is actively exploiting a vulnerability in JetBrains TeamCity's continuous integration/continuous delivery (CI/CD) software, which is used by development teams to manage and automate compilation, building, testing, and releasing software.

appsec & supply chain security attack building continuous continuous delivery continuous integration delivery development development teams exploiting integration jetbrains jetbrains teamcity lessons learned manage software software supply chain software supply chain attack solarwinds sunburst supply supply chain supply chain attack teamcity teams testing vulnerability

More from blog.reversinglabs.com / ReversingLabs Blog

Information System Security Officer (ISSO)

@ LinQuest | Boulder, Colorado, United States

Project Manager - Security Engineering

@ MongoDB | New York City

Security Continuous Improvement Program Manager (m/f/d)

@ METRO/MAKRO | Düsseldorf, Germany

Senior JavaScript Security Engineer, Tools

@ MongoDB | New York City

Principal Platform Security Architect

@ Microsoft | Redmond, Washington, United States

Staff Cyber Security Engineer (Emerging Platforms)

@ NBCUniversal | Englewood Cliffs, NEW JERSEY, United States