A set of all-new updates were being released by GitHub on Friday, all the updates pronounce that how the company will deal with all kind of exploits and malware samples that are hosted on their service.
GitHub is one of the famous internet hosting providers (hosting for software development and version control). According to the experts, all these updates were quite necessary as nowadays malware attacks are increasing rapidly.
After the release of the new updates, the security researcher Nguyen Jang got an email from Microsoft that is owned by GitHub. The email states that the proof-of-concept(PoC) exploit has been detached as it breaches the Acceptable Use Policies.
Soon after that, in a report, GitHub asserted that they have taken down the PoC, as they want to defend Microsoft Exchange servers because recently these servers were being deliberately exploited when the vulnerability was being used.
Apart from all these the experts also affirmed that these new updates will not allow the use of GitHub in support of all illegitimate attacks or any other malware campaigns, as it generally causes technical harm.
With policy updates, GitHub also declared that the uploading of PoC exploits and malware are authorized if they have a dual-user purpose.
Everyone prefers dual-use content, as it means that it can be used for all kinds of positive sharing of new data, and at the same time it can also be utilized for malicious purposes.
However, GitHub has added some key changes in their new updated guidelines, and here we have mentioned them below:-
All these changes were made with the goal to allow, welcome, and encourage dual-use security research and collaboration on GitHub.
Not only this, but GitHub also pronounced that to keep improving its policies from time to time it will keep supporting the community feedback regarding its policies.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.
A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created…
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…