Globant data breach has been confirmed by the company as threat actors have gained accessed their key repository. In a statement by the company, Globant confirmed that a limited section of their code repository was accessed by hackers.
“We have activated our security protocols and are conducting an exhaustive investigation. According to our current analysis, the information that was accessed was limited to certain source code and project-related documentation for a very limited number of clients. To date, we have not found any evidence that other areas of our infrastructure systems or those of our clients were affected. We are taking strict measures to prevent further incidents”, said the company.
On Tuesday, the popular hacking group LapusS shared a 70GB data of Globant’s customer source code in their Telegram channel. “For anyone who is interested about the poor security practices in use at Globant.com I will expose the admin credentials for ALL there devops platforms below,” the group said.
Lapsus$ shared Globant system administrator credentials for Github, Crucible, Confluence and JIRA as well as few other related documents linked to Globant data breach and their customers. As per a cybersecurity researcher Sourfiane Tahiri tweet, the data breach must have begun from Colombia and Bogota.
Lapsus$ is already the buzz on the cybersecurity industry with data breaches on Microsoft, Okta, NVIDIA, Samsung and other major tech giants. Only recently. London law enforcement arrested seven teenagers of LapsusS group.
Lapsus$ hackers announced they are taking a vacation for the week and will be back with more leaks. The same has been done, as they leaked the data of Globant.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…