eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

201
active users

#polyfill

0 posts0 participants0 posts today
Richi Jennings<p>Chinese company takes over widely used free web service—almost 400,000 websites at risk.</p><p>Last week, we warned you to remove any dependencies on the <a href="https://vmst.io/tags/Polyfill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Polyfill</span></a>​.​io web browser fallback service. It’s been taken over by malicious actors and is being used in <a href="https://vmst.io/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> attacks, say researchers.</p><p>This week brings more research, showing the problem’s almost four times as big as we thought. And major public websites are still using it—including government services.</p><p>It’s quite a worry. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we daren’t even breathe on this house of cards. At @TechstrongGroup’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/07/polyfill-supply-chain-richixb/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/07/</span><span class="invisible">polyfill-supply-chain-richixb/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Neil Craig<p>There's nothing new about using 3rd party-hosted assets. That's always been convenient but a terrible idea WRT security.</p><p>Host *all* of your own assets (and version them). Simple but effective.</p><p><a href="https://mastodon.social/tags/PolyFill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolyFill</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDev</span></a></p>
Infoblox Threat Intel<p>Polyfill is going to linger for a longtime and the actors are clever. They will likely continue to change up things. Additional domains have been popping up in the wild, and we use DNS signatures to locate others. Here's our current list of related infrastructure. We have a funny story to share about Polyfill in a few weeks. Anyone got others mssing here? <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/polyfill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>polyfill</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> static-file[.]net<br>staticfile[.]org<br>staticfile[.]net<br>fzg999[.]com<br>bootcdn[.]net<br>union.macoms[.]la<br>newcrbpc[.]com<br>bootcss[.]com<br>terncent[.]com<br>bootcdn[.]cn<br>xhsbpza[.]com<br>staticsfile[.]org<br>polyfill[.]com<br>cdn.polyfill[.]io<br>polyfill[.]io<br>kuurza[.]com<br>ut89.v.bsclink[.]cn<br>5f52353c.u.fn03[.]vip<br>googie-anaiytics[.]com<br>polyfill.io.bsclink[.]cn</p>
InfoQ<p>⚠️Security alert! Sansec unveiled a new supply chain attack targeting the <a href="https://techhub.social/tags/Polyfill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Polyfill</span></a> JS service when accessed through several CDNs hosting it.</p><p>Over 100K sites impacted! Advise removing Polyfill from any sites using it!</p><p>Dive into the details: <a href="https://bit.ly/4cp3oNR" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4cp3oNR</span><span class="invisible"></span></a> </p><p><a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoQ</span></a> <a href="https://techhub.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://techhub.social/tags/CDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDN</span></a> <a href="https://techhub.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://techhub.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
stux⚡<p><a href="https://mstdn.social/tags/Polyfill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Polyfill</span></a> supply chain attack embeds malware in JavaScript CDN assets</p><p>On June 25, 2024, the Sansec security research and malware team announced that a popular JavaScript polyfill project had been taken over by a foreign actor identified as a Chinese-originated company</p><p><a href="https://dev.to/snyk/polyfill-supply-chain-attack-embeds-malware-in-javascript-cdn-assets-55d6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dev.to/snyk/polyfill-supply-ch</span><span class="invisible">ain-attack-embeds-malware-in-javascript-cdn-assets-55d6</span></a></p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/Polyfill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Polyfill</span></a>: <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDN</span></a> Service “polyfill.io” Used by 100K+ Websites Provided Malicious Code in Responses:</p><p><a href="https://checkmarx.com/blog/alert-cdn-service-polyfill-io-used-by-100k-websites-provided-malicious-code-in-responses/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">checkmarx.com/blog/alert-cdn-s</span><span class="invisible">ervice-polyfill-io-used-by-100k-websites-provided-malicious-code-in-responses/</span></a></p>