• DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise
Real Hacker
  • Home
  • Review
    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    How hiring the wrong medical “expert” derailed US pandemic response

    How hiring the wrong medical “expert” derailed US pandemic response

  • Gaming
    Video Games Double Down On NFTs Despite Historic Crashes

    Video Games Double Down On NFTs Despite Historic Crashes

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    The Best Dog Games On Nintendo Switch

    The Best Dog Games On Nintendo Switch

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Destiny 2 DMCA Revenge Plot Now A .6 Million Bungie Lawsuit

    Destiny 2 DMCA Revenge Plot Now A $7.6 Million Bungie Lawsuit

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Fans can now join the waitlist for the Nothing phone (1)

    Fans can now join the waitlist for the Nothing phone (1)

    DaVinci Resolve 18 Beta 5 Update

    DaVinci Resolve 18 Beta 5 Update

    Make UK Drill In The Style Of Dutchavelli Or M24

    Make UK Drill In The Style Of Dutchavelli Or M24

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Instagram is testing a new AI-based age verification, social vouching

    Instagram is testing a new AI-based age verification, social vouching

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Banished To Work In The Metaverse For A Week

    Banished To Work In The Metaverse For A Week

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

  • Applications
    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Android Developers Blog: Developer-Powered CTS (CTS-D)

    Android Developers Blog: Developer-Powered CTS (CTS-D)

  • Security
    Mitek launches MiVIP platform to fight identity theft

    Mitek launches MiVIP platform to fight identity theft

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Pair of Brand-New Cybersecurity Bills Become Law

    Pair of Brand-New Cybersecurity Bills Become Law

No Result
View All Result
  • Home
  • Review
    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    How hiring the wrong medical “expert” derailed US pandemic response

    How hiring the wrong medical “expert” derailed US pandemic response

  • Gaming
    Video Games Double Down On NFTs Despite Historic Crashes

    Video Games Double Down On NFTs Despite Historic Crashes

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    The Best Dog Games On Nintendo Switch

    The Best Dog Games On Nintendo Switch

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Destiny 2 DMCA Revenge Plot Now A .6 Million Bungie Lawsuit

    Destiny 2 DMCA Revenge Plot Now A $7.6 Million Bungie Lawsuit

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Fans can now join the waitlist for the Nothing phone (1)

    Fans can now join the waitlist for the Nothing phone (1)

    DaVinci Resolve 18 Beta 5 Update

    DaVinci Resolve 18 Beta 5 Update

    Make UK Drill In The Style Of Dutchavelli Or M24

    Make UK Drill In The Style Of Dutchavelli Or M24

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Instagram is testing a new AI-based age verification, social vouching

    Instagram is testing a new AI-based age verification, social vouching

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Banished To Work In The Metaverse For A Week

    Banished To Work In The Metaverse For A Week

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

  • Applications
    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Android Developers Blog: Developer-Powered CTS (CTS-D)

    Android Developers Blog: Developer-Powered CTS (CTS-D)

  • Security
    Mitek launches MiVIP platform to fight identity theft

    Mitek launches MiVIP platform to fight identity theft

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Pair of Brand-New Cybersecurity Bills Become Law

    Pair of Brand-New Cybersecurity Bills Become Law

No Result
View All Result
Real Hacker
No Result
View All Result

Home Security

Why DevOps pipelines are under attack and how to fight back

RealHacker Staff by RealHacker Staff
February 27, 2022
Why DevOps pipelines are under attack and how to fight back
Share on FacebookShare on Twitter


In mid-2017, Russian state-sponsored attackers put in a malicious worm in a Ukrainian monetary software program bundle. When companies up to date their software program, it grew to become contaminated. The worm, NotPetya, unfold rapidly, doing billions of {dollars} of harm all over the world. The White Home known as it “essentially the most harmful and expensive cyberattack in historical past.”

Three years later, Russia-linked attackers hijacked the software program improve means of one other piece of enterprise software program, SolarWinds’ Orion community monitoring toolset. Once more, the impression was widespread.

“Gaining access to the software program improvement pipelines offers them an opportunity to succeed in networking infrastructure and get entry to mental property,” says Viktor Gazdag, senior safety marketing consultant at NCC Group, a worldwide cybersecurity advisory agency.

Assaults on DevOps pipelines are growing

It may be tempting to say that assaults like this are remoted and rely upon extremely motivated and expert attackers. In truth, the DevOps pipeline has turn into a preferred goal not only for state actors however prison gangs.

In keeping with a examine launched final month by Argon, an Aqua Safety Firm, assaults on the software program provide chain grew by greater than 300% in comparison with 2020. Frequent techniques embrace planting malicious code in in style open-source packages or exploiting vulnerabilities which might be already there, compromising CI/CD pipeline instruments, and making the most of hard-coded credentials and different misconfigurations and safety points. The open-source part channel was a very in style goal.

Assaults on the open-source software program provide chain elevated 650% final yr in comparison with 2020, in keeping with a examine by Sonatype launched in September. The assault floor is huge. Greater than 37 million parts and packages are within the prime 4 open-source ecosystems, in keeping with Sonatype. Open-source software program downloads hit 2.2 trillion final yr, up 73% in comparison with 2020.

Why DevOps pipelines are susceptible

Software program builders typically have excessive permission ranges and entry privileges, Gazdag says. If the software program being produced is designed for exterior consumption, the impression might be dramatically larger. “The attackers even have the chance to get a foothold within the last software,” he says.

So, the DevOps pipelines ought to have increased ranges of safety in place. As an alternative, they’ve a whole lot of weak safety practices and uncovered infrastructure and credentials. “In case you use Shodan and seek for [development tool] ‘Jenkins’ you may see a whole lot of Jenkins infrastructure out there and accessible on the web,” GazDag says.

Too typically, the CI/CD infrastructure does not get the identical degree of consideration as different areas of the enterprise, Gazdag says. With trendy improvement practices, the state of affairs is getting worse.

“As organizations transfer to DevOps, there’s a tendency to loosen up a few of the controls we’ve got in place round improvement,” says Gartner analyst Dale Gardner. “We wish to be versatile and the entire DevOps methodology is we’re making an attempt to get code out rapidly. Limits and controls get in the way in which of that.”

Sorts of assaults on DevOps pipelines

In keeping with David Wheeler, director of open-source provide chain safety at Linux Basis, the three commonest sorts of assaults are dependency confusion, typosquatting, and malicious code injection.

Dependency confusion, also called namespace confusion, is when an attacker figures out the names of proprietary enterprise software program packages and creates open-source packages with the identical names and later launch dates. Sure pipeline instruments routinely attempt to obtain the most recent model of a software program bundle and wind up getting the one with the malicious payload.

Typosquatting is when an attacker creates an open-source software program bundle with a reputation nearly similar to an actual one, hoping {that a} programmer will make a typo and use the fallacious library.

Code injection is the place attackers add malicious code to a reputable open-source undertaking. They will do it by both stealing a undertaking maintainer’s credentials and importing the code below their identify, volunteering to work on the undertaking themselves, or tampering with open-source developer instruments.

Vulnerabilities in open-source parts

Then there’s the problem of recognized vulnerabilities in open-source parts — vulnerabilities that attackers are fast to take advantage of. In April, software safety testing firm Synopsys reviewed the code of greater than 1,500 enterprise software program tasks, each inside and industrial, and located that 98% of them contained some open-source code. For a mean software, 75% of the codebase was open supply.

Right here’s the scary half: In Synopsys’ evaluation, 84% of the codebases had at the least one vulnerability. That’s earlier than the Log4J vulnerability got here to mild, which safety researchers known as essentially the most harmful Java exploit in years. As well as, 91% % of the open-source parts used hadn’t seen any upkeep up to now two years.

Greater than 28,000 new vulnerabilities had been disclosed in 2021, a report excessive, in keeping with a report launched this month by Flashpoint’s Threat Based mostly Safety. Of these, greater than 4,000 had been remotely exploitable, with each a public exploit and documented resolution data.

The Log4j vulnerability was significantly harmful, surpassing all others in impression, the report mentioned. The library was discovered in additional than 6,200 different software program merchandise, and the variety of vendor advisories continues to climb.

The right way to defend software program improvement pipelines

What ought to firms be doing to guard their software program improvement pipelines? It begins with schooling and coaching for the builders, instituting greatest practices like two-factor authentication and code critiques, and putting in monitoring instruments to flag suspicious actions.

It begins with the builders

At managed providers supplier Ensono, David Gochenaur, senior director of cybersecurity, says that each in-house builders and third-party software program retailers want oversight in terms of the safety of the code improvement and deployment course of. The 2 teams of builders should be approached in numerous methods.

Ensono does not promote software program, but it surely wants customized software program to run its buyer portals. The safety of those portals is of paramount significance. “We handle techniques for lots of purchasers and gather knowledge concerning the standing of these techniques and put it right into a portal,” Gochenaur says.

That signifies that Ensono’s instruments have entry to these buyer techniques, which makes Ensono a high-value goal for attackers. “As a result of there are such a lot of purchasers, you wish to guarantee that shopper A cannot get into shopper B’s knowledge,” Gochenaur says.

The stakes are excessive, Gochenaur says. “A few of our purchasers are very delicate from a nationwide safety perspective and privateness views,” he says. So the primary problem is to be very stringent in terms of vetting distributors. “It’s important to get to know them very effectively,” he says. “The SolarWinds incident is an effective instance and there are numerous different examples on the market of third events that didn’t safe themselves very effectively and had been used as entry factors for menace actors.”

That features outdoors software program improvement companies. “Once we use third events, we vet them fairly laborious to ensure they’ve processes and controls in place to guarantee that no matter we’re getting from them is safe,” Gochenaur says. That features reviewing their testing procedures and the safety controls they’ve in place of their improvement surroundings. “And we construct defect penalties into the contracts,” he provides.

Then, for the corporate’s personal builders, the most important challenge is to not use publicly accessible code repositories “as a result of something could possibly be on the market,” Gochenaur says. “There may be code that simply appears to be like superior. Most likely is superior for a lot of causes. It does superior issues for you, but it surely permits menace actors entry to no matter you’ve happening.”

Builders could possibly be taking many different measures to assist them produce safer code, Gochenaur says. One technique that has helped present each safety coaching and motivation is to run penetration checks by third events and by in-house groups. “It would make an enormous distinction within the high quality of the product that’s developed,” he says.

In truth, when Gochenaur’s operating pen-tests on the corporate software program, builders have all the time requested to take a seat in on the checks and watch the white-hat hackers do their work. “They needed to grasp what they had been doing and study from the vulnerabilities that the pen-testers discovered,” he says. “It gave the builders a special technique to suppose. Now, after I herald a 3rd occasion, that is certainly one of my necessities — that the technical groups can look over their shoulders and see what is going on on and study from them.”

Use correct instruments and controls

To assist the corporate’s builders make good choices, and to assist hold them protected, Ensono has a number of safety controls in place. For instance, multi-factor authentication helps hold outsiders from accessing the DevOps pipeline. The corporate makes use of non-public code libraries in order that builders can decide from code that is already been reviewed and authorised.

Ensono additionally has groups devoted to patching techniques, to make sure that every thing that’s deployed is present and updated. “We scan our total surroundings often searching for vulnerabilities,” Gochenaur says.

Firms can do different issues to assist lock down their improvement pipeline which might be typically missed, says Venky Chennapragada, DevOps architect at Capgemini Americas. For instance, firms ought to have separate pipelines for the non-production staging surroundings and for manufacturing — and to restrict the individuals who have entry to each techniques. To lock down the entry even additional, firms must be utilizing enterprise-grade entry administration techniques, like Energetic Listing or LDAP.

Many firms have a separate person database for the software program improvement groups or use built-in person administration instruments. It’s simpler to have a separate system.

“If I am integrating with Energetic Listing or LDAP there’s going to be a safety audit,” Chennapragada says. “Some engineers may wish to bypass the safety audit as a result of they did not set up issues correctly.”

Function-based entry is one other management that builders may chafe at. “It is all the time straightforward to present full entry, and never must create person teams and roles,” Chennapragada says, “but it surely’s dangerous follow.”

Lastly, Chennapragada recommends that organizations rigorously monitor all of the parts that go into their software program, particularly the open-source libraries. “Builders tend to incorporate open-source code of their software program and it will probably have bugs and safety vulnerabilities,” he says.

Exterior libraries have to bear safety scanning and code critiques, and builders must be restricted to solely utilizing licensed dependencies. It is not simply libraries that builders may wish to seize off the web. Different enticing instruments embrace working system variants and plugins.

Linux, for instance, is available in tens of millions of various flavors. “Ensure any model they use is hardened, is the most recent and updated,” Chennapragada says. The favored improvement software Jenkins, an open-source automation server, comes with a wide range of plugins. “There are plugins for every thing,” he says, “however the plugins might be actually susceptible. Individuals can put malicious code within the plugin that may take over your system.”

Many safety controls and processes can be found that do not price lots and do not create an excessive amount of overhead, however do require some considerate planning or coaching, says Ilia Kolochenko, CEO at cybersecurity vendor ImmuniWeb. For instance, AWS presents built-in safety controls and instruments that aren’t costly and even free, he says. “Individuals don’t go for them as a result of they’re unaware, don’t suppose they want them, or it is too troublesome to dig into them and leverage them.”

The cloud makes it simpler to deploy instruments like steady safety monitoring and incident response, he says. “You possibly can detect suspicious exercise, instantly cease it, exchange it with a clear picture, and proceed your operations with out going offline. The cloud offers many nice alternatives to automate your steady safety monitoring and incident response, however individuals do not use it.”

Request SBOMs but additionally scan for vulnerabilities

Many within the business have been pushing for a software program invoice of supplies (SBOM). Final Might, President Biden issued an government order requiring SBOMs from distributors that present software program to the federal authorities. Two days later, the Cloud Native Computing Basis launched a best-practices white paper recommending that each one distributors present an SBOM the place doable, with clear and direct hyperlinks to dependencies.

An SBOM would assist firms discover cases of susceptible parts of their surroundings. For instance, Log4j was patched in December, however, as of February 11, 40% of all downloads had been nonetheless of the susceptible model.

“In case you purchase a loaf of bread, it is received the record of components written on the aspect,” says Kayne McGladrey, IEEE senior member and cybersecurity strategist at Ascent Options, a expertise consulting agency. “Having that for software program permits organizations to make knowledgeable danger choices.”



Source link

Related

Tags: AttackDevOpsfightpipelines
RealHacker Staff

RealHacker Staff

Recommended.

Firefox for iOS Updated With Adjustable Search Bar

Firefox for iOS Updated With Adjustable Search Bar

March 9, 2022
Samsung Galaxy A04 spotted on Wi-Fi Alliance

Samsung Galaxy A04 spotted on Wi-Fi Alliance

June 10, 2022

Trending.

Hypex Presents New Nilai500 DIY Audio Amplifier Module

Hypex Presents New Nilai500 DIY Audio Amplifier Module

May 16, 2022
ADPTR Audio Sculpt review: A must-have dynamics plug-in for mastering and mixing engineers

ADPTR Audio Sculpt review: A must-have dynamics plug-in for mastering and mixing engineers

March 15, 2022
NAMM 2022: Audeze partners Manny Marroquin on the Manny MM-500 headphones

NAMM 2022: Audeze partners Manny Marroquin on the Manny MM-500 headphones

June 3, 2022
12 best rotary mixers for DJs

12 best rotary mixers for DJs

March 16, 2022
How To Get Into Halo Infinite’s Campaign Co-Op Beta Test

How To Get Into Halo Infinite’s Campaign Co-Op Beta Test

June 8, 2022

Follow Us

Categories

  • Applications
  • Audio
  • Camera
  • Computers
  • Gaming
  • Gear
  • Laptop
  • Metaverse
  • Microsoft
  • Photography
  • Review
  • Security
  • Smartphone
  • Uncategorized

Recent News

Mitek launches MiVIP platform to fight identity theft

Mitek launches MiVIP platform to fight identity theft

June 24, 2022
Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

June 24, 2022
  • DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise

© 2019 - theme develop by real hacker news.

No Result
View All Result
  • Home
  • Review
  • Applications
  • Computers
  • Gaming
  • Gear
    • Audio
    • Camera
    • Smartphone
  • Microsoft
  • Photography
  • Security

© 2019 - theme develop by real hacker news.

error: Content is protected !!