SCW Icons
hero bg no divider
Blog

侵害が増え、問題が増える:サードパーティーアプリへの信頼の代償

Pieter Danhieux
Published Jul 05, 2018
Last updated on Mar 10, 2026

It's no secret that our main mission is to make software and its development safe; crafted with security in mind from the very beginning of production. Our vision sets a new benchmark for software creation, where developers are empowered with the skills and knowledge detect vulnerable code during the writing process and fix it before it even becomes an issue.

So, with that in mind, you may think we're delighted to hear of new data breaches, cyber attacks and exploited code affecting companies all over the world - those incidents certainly highlight the need for our service in multiple verticals. The truth is, it's quite frustrating. It's clear that as an industry we are making the same mistakes time and time again, because most security education just isn't robust enough to minimise risk and stop these breaches.

The latest data breach victim is Ticketmaster. If you were among the thousands of affected customers, you'd have received an email notifying you of the incident and to change your password. No-one expects to have their personal data violated simply for buying tickets to a concert or sporting event, yet here we are.

It's an awful situation for everyone; detrimental to Ticketmaster's reputation and a downright rotten customer experience. There's one problem, though: it wasn't entirely their fault.

You see, the company utilised the services of a third-party customer support application from Inbenta Technologies. Ticketmaster UK discovered that the product contained malicious code, leading to five percent of their global customer data being compromised.

And how exactly did hackers manage to exploit this system? They manipulated a single line of JavaScript code, customized by Inbenta Technologies for Ticketmaster's requirements. According to Inbenta, the code was used on a page it was not built to accommodate, and had they known, would have identified it as a security vulnerability.

The vulnerability itself is essentially a file upload/storage library security issue, wherein just one breach can affect every site on which the same code is loaded. The code can be modified to collect and reroute personal data to the attackers, just for starters. This is a simple exploit with far-reaching damage potential, and it is something we are working on defending against with a range of in-platform training exercises for developers.

Of course, it's virtually impossible to run a business without relying on some third-party applications. However, you have no control over how they build their software, and essentially zero visibility on the security strength of their code. It becomes a trust exercise. If your third-party partner is lax in their secure coding practices, you may be opening the door to a breach in yourcompany.

So, what's the solution? Put simply: we all must do better. We must stop thinking of security as an irritating obstacle on the path of company innovation.

It is easier than you think to empower your dev team with the right tools and knowledge to embrace security, stopping bad code in its tracks. We have been pleased to see so many of the worlds largest and most well-known financial, telecommunications, retail and tech companies adopt this new approach, but it shouldnt be the sole domain of Fortune 100 companies to take steps in security education. Every company that counts developers among their staff needs to implement training to help teams code securely.

The recently released white paper I wrote in conjunction with our CTO Matias Madou, showcases the benefits of building a security culture in your organisation. We detail why it is the key to unlocking innovation, staying agile and reducing the financial impact of insecure code.

You'll find tips including:

* How to make security training relevant and engaging for developers

* How to teach developers to identify and fix their own issues

* How to help developers securely construct their own code.

I invite you to download this resource and use it to champion security in your organisation, build the skills of your team and be at the forefront of setting a higher standard of code.

We must stop thinking of security as an irritating obstacle on the path of company innovation.
リソースを表示
リソースを表示

セキュリティを企業のイノベーションの道における苛立たしい障害と考えるのはやめなければなりません。

もっと興味がありますか?

Chief Executive Officer, Chairman, and Co-Founder

learn more

Secure Code Warriorは、ソフトウェア開発ライフサイクル全体にわたってコードを保護し、サイバーセキュリティを最優先とする文化を築くお手伝いをします。アプリケーションセキュリティマネージャ、開発者、CISO、またはセキュリティ関係者のいずれであっても、安全でないコードに関連するリスクを軽減するお手伝いをします。

デモを予約
シェア:
linkedin brandsSocialx logo
著者
Pieter Danhieux
Published Jul 05, 2018

Chief Executive Officer, Chairman, and Co-Founder

Pieter Danhieux is a globally recognized security expert, with over 12 years experience as a security consultant and 8 years as a Principal Instructor for SANS teaching offensive techniques on how to target and assess organizations, systems and individuals for security weaknesses. In 2016, he was recognized as one of the Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA - Australian Information Security Association) and holds GSE, CISSP, GCIH, GCFA, GSEC, GPEN, GWAPT, GCIA certifications.

シェア:
linkedin brandsSocialx logo

It's no secret that our main mission is to make software and its development safe; crafted with security in mind from the very beginning of production. Our vision sets a new benchmark for software creation, where developers are empowered with the skills and knowledge detect vulnerable code during the writing process and fix it before it even becomes an issue.

So, with that in mind, you may think we're delighted to hear of new data breaches, cyber attacks and exploited code affecting companies all over the world - those incidents certainly highlight the need for our service in multiple verticals. The truth is, it's quite frustrating. It's clear that as an industry we are making the same mistakes time and time again, because most security education just isn't robust enough to minimise risk and stop these breaches.

The latest data breach victim is Ticketmaster. If you were among the thousands of affected customers, you'd have received an email notifying you of the incident and to change your password. No-one expects to have their personal data violated simply for buying tickets to a concert or sporting event, yet here we are.

It's an awful situation for everyone; detrimental to Ticketmaster's reputation and a downright rotten customer experience. There's one problem, though: it wasn't entirely their fault.

You see, the company utilised the services of a third-party customer support application from Inbenta Technologies. Ticketmaster UK discovered that the product contained malicious code, leading to five percent of their global customer data being compromised.

And how exactly did hackers manage to exploit this system? They manipulated a single line of JavaScript code, customized by Inbenta Technologies for Ticketmaster's requirements. According to Inbenta, the code was used on a page it was not built to accommodate, and had they known, would have identified it as a security vulnerability.

The vulnerability itself is essentially a file upload/storage library security issue, wherein just one breach can affect every site on which the same code is loaded. The code can be modified to collect and reroute personal data to the attackers, just for starters. This is a simple exploit with far-reaching damage potential, and it is something we are working on defending against with a range of in-platform training exercises for developers.

Of course, it's virtually impossible to run a business without relying on some third-party applications. However, you have no control over how they build their software, and essentially zero visibility on the security strength of their code. It becomes a trust exercise. If your third-party partner is lax in their secure coding practices, you may be opening the door to a breach in yourcompany.

So, what's the solution? Put simply: we all must do better. We must stop thinking of security as an irritating obstacle on the path of company innovation.

It is easier than you think to empower your dev team with the right tools and knowledge to embrace security, stopping bad code in its tracks. We have been pleased to see so many of the worlds largest and most well-known financial, telecommunications, retail and tech companies adopt this new approach, but it shouldnt be the sole domain of Fortune 100 companies to take steps in security education. Every company that counts developers among their staff needs to implement training to help teams code securely.

The recently released white paper I wrote in conjunction with our CTO Matias Madou, showcases the benefits of building a security culture in your organisation. We detail why it is the key to unlocking innovation, staying agile and reducing the financial impact of insecure code.

You'll find tips including:

* How to make security training relevant and engaging for developers

* How to teach developers to identify and fix their own issues

* How to help developers securely construct their own code.

I invite you to download this resource and use it to champion security in your organisation, build the skills of your team and be at the forefront of setting a higher standard of code.

We must stop thinking of security as an irritating obstacle on the path of company innovation.
リソースを表示
リソースを表示

レポートをダウンロードするには、以下のフォームに記入してください

当社の製品および/または関連するセキュアコーディングのトピックに関する情報を送信する許可をお願いします。当社は、お客様の個人情報を常に細心の注意を払って取り扱い、マーケティング目的で他社に販売することは決してありません。

送信
scw success icon
scw error icon
フォームを送信するには、「アナリティクス」クッキーを有効にしてください。設定が完了したら、再度無効にしても構いません。

It's no secret that our main mission is to make software and its development safe; crafted with security in mind from the very beginning of production. Our vision sets a new benchmark for software creation, where developers are empowered with the skills and knowledge detect vulnerable code during the writing process and fix it before it even becomes an issue.

So, with that in mind, you may think we're delighted to hear of new data breaches, cyber attacks and exploited code affecting companies all over the world - those incidents certainly highlight the need for our service in multiple verticals. The truth is, it's quite frustrating. It's clear that as an industry we are making the same mistakes time and time again, because most security education just isn't robust enough to minimise risk and stop these breaches.

The latest data breach victim is Ticketmaster. If you were among the thousands of affected customers, you'd have received an email notifying you of the incident and to change your password. No-one expects to have their personal data violated simply for buying tickets to a concert or sporting event, yet here we are.

It's an awful situation for everyone; detrimental to Ticketmaster's reputation and a downright rotten customer experience. There's one problem, though: it wasn't entirely their fault.

You see, the company utilised the services of a third-party customer support application from Inbenta Technologies. Ticketmaster UK discovered that the product contained malicious code, leading to five percent of their global customer data being compromised.

And how exactly did hackers manage to exploit this system? They manipulated a single line of JavaScript code, customized by Inbenta Technologies for Ticketmaster's requirements. According to Inbenta, the code was used on a page it was not built to accommodate, and had they known, would have identified it as a security vulnerability.

The vulnerability itself is essentially a file upload/storage library security issue, wherein just one breach can affect every site on which the same code is loaded. The code can be modified to collect and reroute personal data to the attackers, just for starters. This is a simple exploit with far-reaching damage potential, and it is something we are working on defending against with a range of in-platform training exercises for developers.

Of course, it's virtually impossible to run a business without relying on some third-party applications. However, you have no control over how they build their software, and essentially zero visibility on the security strength of their code. It becomes a trust exercise. If your third-party partner is lax in their secure coding practices, you may be opening the door to a breach in yourcompany.

So, what's the solution? Put simply: we all must do better. We must stop thinking of security as an irritating obstacle on the path of company innovation.

It is easier than you think to empower your dev team with the right tools and knowledge to embrace security, stopping bad code in its tracks. We have been pleased to see so many of the worlds largest and most well-known financial, telecommunications, retail and tech companies adopt this new approach, but it shouldnt be the sole domain of Fortune 100 companies to take steps in security education. Every company that counts developers among their staff needs to implement training to help teams code securely.

The recently released white paper I wrote in conjunction with our CTO Matias Madou, showcases the benefits of building a security culture in your organisation. We detail why it is the key to unlocking innovation, staying agile and reducing the financial impact of insecure code.

You'll find tips including:

* How to make security training relevant and engaging for developers

* How to teach developers to identify and fix their own issues

* How to help developers securely construct their own code.

I invite you to download this resource and use it to champion security in your organisation, build the skills of your team and be at the forefront of setting a higher standard of code.

We must stop thinking of security as an irritating obstacle on the path of company innovation.
オンラインセミナーを見る
始めよう
learn more

以下のリンクをクリックして、このリソースのPDFをダウンロードしてください。

Secure Code Warriorは、ソフトウェア開発ライフサイクル全体にわたってコードを保護し、サイバーセキュリティを最優先とする文化を築くお手伝いをします。アプリケーションセキュリティマネージャ、開発者、CISO、またはセキュリティ関係者のいずれであっても、安全でないコードに関連するリスクを軽減するお手伝いをします。

レポートを表示デモを予約
PDF をダウンロード
リソースを表示
シェア:
linkedin brandsSocialx logo
もっと興味がありますか?

シェア:
linkedin brandsSocialx logo
著者
Pieter Danhieux
Published Jul 05, 2018

Chief Executive Officer, Chairman, and Co-Founder

Pieter Danhieux is a globally recognized security expert, with over 12 years experience as a security consultant and 8 years as a Principal Instructor for SANS teaching offensive techniques on how to target and assess organizations, systems and individuals for security weaknesses. In 2016, he was recognized as one of the Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA - Australian Information Security Association) and holds GSE, CISSP, GCIH, GCFA, GSEC, GPEN, GWAPT, GCIA certifications.

シェア:
linkedin brandsSocialx logo

It's no secret that our main mission is to make software and its development safe; crafted with security in mind from the very beginning of production. Our vision sets a new benchmark for software creation, where developers are empowered with the skills and knowledge detect vulnerable code during the writing process and fix it before it even becomes an issue.

So, with that in mind, you may think we're delighted to hear of new data breaches, cyber attacks and exploited code affecting companies all over the world - those incidents certainly highlight the need for our service in multiple verticals. The truth is, it's quite frustrating. It's clear that as an industry we are making the same mistakes time and time again, because most security education just isn't robust enough to minimise risk and stop these breaches.

The latest data breach victim is Ticketmaster. If you were among the thousands of affected customers, you'd have received an email notifying you of the incident and to change your password. No-one expects to have their personal data violated simply for buying tickets to a concert or sporting event, yet here we are.

It's an awful situation for everyone; detrimental to Ticketmaster's reputation and a downright rotten customer experience. There's one problem, though: it wasn't entirely their fault.

You see, the company utilised the services of a third-party customer support application from Inbenta Technologies. Ticketmaster UK discovered that the product contained malicious code, leading to five percent of their global customer data being compromised.

And how exactly did hackers manage to exploit this system? They manipulated a single line of JavaScript code, customized by Inbenta Technologies for Ticketmaster's requirements. According to Inbenta, the code was used on a page it was not built to accommodate, and had they known, would have identified it as a security vulnerability.

The vulnerability itself is essentially a file upload/storage library security issue, wherein just one breach can affect every site on which the same code is loaded. The code can be modified to collect and reroute personal data to the attackers, just for starters. This is a simple exploit with far-reaching damage potential, and it is something we are working on defending against with a range of in-platform training exercises for developers.

Of course, it's virtually impossible to run a business without relying on some third-party applications. However, you have no control over how they build their software, and essentially zero visibility on the security strength of their code. It becomes a trust exercise. If your third-party partner is lax in their secure coding practices, you may be opening the door to a breach in yourcompany.

So, what's the solution? Put simply: we all must do better. We must stop thinking of security as an irritating obstacle on the path of company innovation.

It is easier than you think to empower your dev team with the right tools and knowledge to embrace security, stopping bad code in its tracks. We have been pleased to see so many of the worlds largest and most well-known financial, telecommunications, retail and tech companies adopt this new approach, but it shouldnt be the sole domain of Fortune 100 companies to take steps in security education. Every company that counts developers among their staff needs to implement training to help teams code securely.

The recently released white paper I wrote in conjunction with our CTO Matias Madou, showcases the benefits of building a security culture in your organisation. We detail why it is the key to unlocking innovation, staying agile and reducing the financial impact of insecure code.

You'll find tips including:

* How to make security training relevant and engaging for developers

* How to teach developers to identify and fix their own issues

* How to help developers securely construct their own code.

I invite you to download this resource and use it to champion security in your organisation, build the skills of your team and be at the forefront of setting a higher standard of code.

We must stop thinking of security as an irritating obstacle on the path of company innovation.

目次

PDF をダウンロード
リソースを表示
もっと興味がありますか?

Chief Executive Officer, Chairman, and Co-Founder

learn more

Secure Code Warriorは、ソフトウェア開発ライフサイクル全体にわたってコードを保護し、サイバーセキュリティを最優先とする文化を築くお手伝いをします。アプリケーションセキュリティマネージャ、開発者、CISO、またはセキュリティ関係者のいずれであっても、安全でないコードに関連するリスクを軽減するお手伝いをします。

デモを予約[ダウンロード]
シェア:
linkedin brandsSocialx logo
リソースハブ

始めるためのリソース

その他の投稿
リソースハブ

始めるためのリソース

その他の投稿