{"id":6177,"date":"2025-01-29T10:38:10","date_gmt":"2025-01-29T10:38:10","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=6177"},"modified":"2025-07-03T11:55:47","modified_gmt":"2025-07-03T11:55:47","slug":"the-state-of-azure-devops-threat-landscape-2024-in-review","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/","title":{"rendered":"The State of Azure DevOps Threat Landscape &#8211; 2024 In Review"},"content":{"rendered":"\n<p>The year 2024 is over, so it\u2019s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware &#8211; all of those were appearing in media headlines all year round. Thus, for the third year in a row, we\u2019ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian.&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Our first article in a DevOps threat landscape series is dedicated to Azure DevOps. Let\u2019s dive into the news, reports, and Azure DevOps status to see which threats Azure DevOps users had to deal with in the previous year.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"917\" height=\"703\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/reported_incidents_v2.png\" alt=\"\" class=\"wp-image-6194\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/reported_incidents_v2.png 917w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/reported_incidents_v2-300x230.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/reported_incidents_v2-768x589.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/reported_incidents_v2-400x307.png 400w\" sizes=\"(max-width: 917px) 100vw, 917px\" \/><\/figure><\/div>\n\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>DECEMBER<\/strong><br><br><strong>Azure DevOps Status: 3 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 3 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded performance &#8211; 39 hours 21 minutes<\/strong><\/p>\n\n\n\n<p>In December some Azure DevOps users in Europe and Brazil experienced 3 incidents with degraded impact, totaling almost 40 hours.&nbsp;<\/p>\n\n\n\n<p>Those 3 cases of degradation performance were impacting Azure DevOps services, including Boards, Repos, Pipelines, Test Plans, Artifacts, and other services.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>NOVEMBER<\/strong><br><br><strong>Azure DevOps Status: 12 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 12 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 19 hours 55 minutes<\/strong><\/p>\n\n\n\n<p>Azure DevOps experienced 12 incidents in November. All of the incidents Microsoft classified as degraded impact totaled around 20 hours of disruption.<\/p>\n\n\n\n<p>The most significant incident occurred on November 18th, impacting North European users for over 6 hours, who had difficulties accessing Boards, Repos, Pipelines, and Test Plans.<\/p>\n\n\n\n<p>Other incidents were shorter, targeting different regions, including Asia Pacific, the United States, Australia, and Brazil.<\/p>\n\n\n\n<p>Among the services that were impacted in November were pipelines, boards, repos, and other core services.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>OCTOBER<\/strong><br><br><strong>Azure DevOps Status: 7 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 7 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 42 hours 55 minutes<\/strong><\/p>\n\n\n\n<p>In October Azure DevOps users globally experienced 7 degraded incidents with a total time for disruptions of over 40 hours.<\/p>\n\n\n\n<p>The incidents included brief availability degradations across test plans, boards, repos, pipelines, and other services.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>SEPTEMBER<\/strong><br><br><strong>Azure DevOps Status: 6 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 6 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 168 hours 34 min<\/strong><\/p>\n\n\n\n<p>In September Azure DevOps faced 6 degraded incidents, totaling around 168 hours of disruption\u2026 almost 7 days! The most prolonged incidents included a 93-hour 28-minute issue that affected connections in Pipelines.&nbsp;<\/p>\n\n\n\n<p>Other smaller incidents impacted Artifacts and other Azure DevOps services.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>AUGUST<\/strong><br><br><strong>Azure DevOps Status: 5 incidents<\/strong><br><br><strong>\ud83d\udea8 Incidents that had a major impact &#8211; 1 incident<\/strong><br><strong>\u231b Total time of incidents with unhealthy <strong>performance<\/strong> &#8211; 1 hour 21 minutes<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 4 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 11 hours 8 minutes<\/strong><\/p>\n\n\n\n<p>Azure DevOps users could experience 5 incidents of different severity in August. The total time of disruption compounds 12 hours and 29 minutes.<\/p>\n\n\n\n<p>The major incident, lasting 1 hour and 21 minutes on August 5, caused intermittent errors across core services like Boards, Repos, and Pipelines in Brazil and the United States.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Services across North and Latin America are taken down due to Microsoft Azure outage<\/h2>\n\n\n\n<p>Multiple Azure customers across North and Latin America were taken down due to a Microsoft Azure outage. The company said that the incident impacted services that leverage Azure Front Door (AFD).&nbsp;<\/p>\n\n\n\n<p>As Microsoft stated, the incident happened due to \u201c<em>a recent configuration change made by an internal service team that uses AFD. Once that change was understood as the trigger event, we initiated a rollback of the configuration change which fully mitigated all customer impact<\/em>.&#8221;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-1024x511.png\" alt=\"Azure DevOps threats 1\" class=\"wp-image-6181\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-1024x511.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-300x150.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-768x383.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-400x199.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-600x300.png 600w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1-800x400.png 800w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/AzureDevOps-threats-1.png 1111w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/status.dev.azure.com\/_event\/529831915\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>Azure DevOps Status<\/em><\/a><\/p>\n\n\n\n<p>As a result, for around 2 hours Azure DevOps users reported errors connecting to Azure services and logging problems.&nbsp;<\/p>\n\n\n\n<p>This outage followed another massive incident, an Azure outage, that lasted for 9 hours and impacted many Azure and Microsoft 365 services. The reason for that 9-hour outage was a volumetric TCP SYN flood DDoS attack which targeted many Azure Front Door and CDN sites.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-azure-outage-takes-down-services-across-north-america\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a> \/ <a href=\"https:\/\/www.datacenterdynamics.com\/en\/news\/azure-front-door-configuration-change-causes-microsoft-cloud-issues\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DCD<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>JULY<\/strong><br><br><strong>Azure DevOps Status: 22 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 22 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 376 hours 08 minutes<\/strong><\/p>\n\n\n\n<p>In July, Azure DevOps users around the world saw 22 incidents, all with degraded impact, resulting in a total disruption time of more than 200 hours (more than 8 days!).<\/p>\n\n\n\n<p>The key incidents included an over 275-hour-long disruption affecting test case order changes across multiple regions and a 38-hour availability degradation in Service Hooks in SEA.&nbsp;<\/p>\n\n\n\n<p>Other incidents were affecting core Azure DevOps services like Boards, Pipelines, Test Plans, and Repos across various regions, including Europe, South and North America.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Storage incident in the Central US impacted Azure DevOps users all over the world<\/h2>\n\n\n\n<p>On July 18th Azure DevOps users might experience issues accessing their Azure DevOps organization.<\/p>\n\n\n\n<p>In their <a href=\"https:\/\/status.dev.azure.com\/_event\/524064579\/post-mortem\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">post-mortem<\/a>, Microsoft explained that <em>\u201cThis outage lasted roughly from 21:40 to 02:55 UTC. During this outage, customers may have experienced a range of impact from a full outage of their organization to partial degradation with certain functionality unavailable such as Artifacts, Packaging, Test, etc.\u201d<\/em><\/p>\n\n\n\n<p>The outage was caused by VM availability in the Central US region and led to all Azure DevOps organizations located in that region being inaccessible. For over an hour, Azure DevOps users were receiving a 503 \u201cService unavailable\u201d message when they were trying to access their Azure DevOps instances. Moreover, around 1.4% of organizations outside of the Central US region might also be experiencing some kind of performance degradation at that time as well.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"624\" height=\"162\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/Azure-DevOps-2.png\" alt=\"Azure DevOps threats 2\" class=\"wp-image-6182\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/Azure-DevOps-2.png 624w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/Azure-DevOps-2-300x78.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/Azure-DevOps-2-400x104.png 400w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <a href=\"https:\/\/status.dev.azure.com\/_event\/524064579\/post-mortem\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Azure DevOps post-mortem<\/a>: request failure rates<\/em><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>JUNE<br><\/strong><br><strong>Azure DevOps Status: 15 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 15 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 21 hours 30 minutes<\/strong><\/p>\n\n\n\n<p>The incidents that Azure DevOps users might face in June were all of degraded severity with the total time of disruption of 21+ hours.<\/p>\n\n\n\n<p>The most significant incident was a 7-hour 26-minute service connection degradation affecting Pipelines.<\/p>\n\n\n\n<p>Other incidents were much shorter and impacted such Azure DevOps services as Boards, Pipelines, Repos, and Test Plans.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat actors might gain unauthorized access to Cloud Azure resources<\/h2>\n\n\n\n<p>Ten Azure services, including Azure DevOps, Azure, Azure Load Testing, Azure API Management Application Insights, etc. were found vulnerable to a bug that allowed an attacker to bypass firewall rules and gain unauthorized access to cloud resources by abusing Azure Service Tags.<\/p>\n\n\n\n<p>A researcher from the cybersecurity firm Tenable <a href=\"https:\/\/www.tenable.com\/blog\/these-services-shall-not-pass-abusing-service-tags-to-bypass-azure-firewall-rules-customer\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">stated<\/a>:<\/p>\n\n\n\n<p><em>\u201cThis vulnerability enables an attacker to control server-side requests, thus impersonating trusted Azure services. This enables the attacker to bypass network controls based on Service Tags, which are often used to prevent public access to Azure customers&#8217; internal assets, data, and services.<\/em>\u201d<\/p>\n\n\n\n<p>While there\u2019s no evidence of this vulnerability being exploited in the wild, Microsoft advises customers to review their use of Service Tags, strengthen validation controls, and implement robust authentication to ensure only trusted traffic is allowed.<\/p>\n\n\n\n<p>In its guidance issued on June 3rd, 2024, <a href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/06\/improved-guidance-for-azure-network-service-tags\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft states<\/a> that <em>\u201cService tags are not to be treated as a security boundary and should only be used as a routing mechanism in conjunction with validation. [&#8230;] Service tags are not a comprehensive way to secure traffic to a customer\u2019s origin and do not replace input validation to prevent vulnerabilities that may be associated with web requests.<\/em>\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2024\/06\/azure-service-tags-vulnerability.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a> \/ <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/azure-service-tags-tagged-as-security-risk-microsoft-disagrees\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>MAY<\/strong><br><br><strong>Azure DevOps Status: 10 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 10 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 18 hours 38 minutes<\/strong><\/p>\n\n\n\n<p>In May, Azure DevOps encountered 10 incidents with a degraded impact, amounting to a total disruption time of over 18 hours.<\/p>\n\n\n\n<p>Users from all geographies might experience disruptions while working with Boards, Repos Pipelines, and other Azure DevOps services. The longest incident that month, lasting 6 hours and 56 minutes, involved failures in Pipelines due to Workload Identity federation-based ARM service connections.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\">APRIL<br><br><strong>Azure DevOps Status: 12 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 12 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded severity &#8211; 41 hours 25 min<\/strong><\/p>\n\n\n\n<p>Users of Azure DevOps in different locations might experience 12 incidents with degraded impact, varying from a few minutes to hours. Summing up, Azure DevOps experienced more than 42 hours of disruptions in April.&nbsp;<\/p>\n\n\n\n<p>The longest incident lasted over 19 hours. During that time Azure DevOps users all around the world might experience slowness and disconnections from the service, impacting Boards, Repos, Pipelines, Artifacts, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Failures and slowness across Azure DevOps in all geographies<\/h2>\n\n\n\n<p>On April 25th, Azure DevOps users all around the world might experience service availability degradation &#8211; the slowness and intermittent failures across the service. The issue stemmed from a severe performance regression in a frequently used stored procedure within the Token Service database, increasing execution time by nearly 5000x.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"359\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8-1024x359.png\" alt=\"Azure DevOps threats 3\" class=\"wp-image-6183\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8-1024x359.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8-300x105.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8-768x269.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8-400x140.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/image-8.png 1099w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Source: <\/em><a href=\"https:\/\/status.dev.azure.com\/_event\/497225591\/post-mortem\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>Azure DevOps post-mortem<\/em><\/a><em>: Global request failure rate %<\/em><\/p>\n\n\n\n<p>As Microsoft stated in its <a href=\"https:\/\/status.dev.azure.com\/_event\/497225591\/post-mortem\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">post-mortem<\/a> later <em>\u201cThe incident was caused by a significant regression in the performance of a stored procedure with a high frequency of calls in the Token Service.\u201d<\/em><\/p>\n\n\n\n<p>Among the affected Azure DevOps experiences were Azure Pipelines with an average delay of over 3 minutes, Personal Access Token (PAT) usage, and increased failure rates for Azure DevOps extensions, with the global request failure rate peaking at around 20%.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reduced availability of Azure DevOps services across the globe<\/h2>\n\n\n\n<p>Some Azure DevOps users were experiencing network-related errors, unexpected cancellations, and slowness while they were trying to access <a href=\"https:\/\/gitprotect.io\/blog\/best-practices-for-securing-git-lfs-on-github-gitlab-bitbucket-and-azure-devops\/\" target=\"_blank\" rel=\"noreferrer noopener\">large files<\/a> over HTTPS for a few days (April, 22nd &#8211; April 24th). That led to reduced availability of Azure repositories, boards, and pipelines.<\/p>\n\n\n\n<p>As Microsoft explained in its <a href=\"https:\/\/status.dev.azure.com\/_event\/496920595\/post-mortem\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">post-mortem<\/a>, the reason turned out to be an update that the service provider rolled out sometime prior:<\/p>\n\n\n\n<p><em>\u201cAs part of ongoing work to make Azure Front Door more reliable, the team rolled out an update, which included a specific change for how packets are processed.\u202fDue to this change, some traffic was not processed correctly, which triggered clients to resend the packets, and this led to higher latency. As such, this issue\u202fprimarily affected\u202fscenarios with large downloads and responses.\u201d<\/em><\/p>\n\n\n\n<p>Azure DevOps engineers quickly detected and addressed the issue.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>MARCH<\/strong><br><br><strong>Azure DevOps Status: 7 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 7 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 36 hours 22 min<\/strong><\/p>\n\n\n\n<p>In March 2024, Azure DevOps experienced seven incidents resulting in degraded service across various regions, totaling over 36 hours of disruption.<\/p>\n\n\n\n<p>The most significant issue happened on March 27\u201328, when Analytics dashboard widgets failed to load globally for over 22 hours.<\/p>\n\n\n\n<p>Other incidents included availability degradations in Central US, West Europe, and the UK, affecting Boards, Repos, Pipelines, and Test Plans. The artifacts were also impacted twice, showing degraded performance in West Europe and the Central US region.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>FEBRUARY<\/strong><br><br><strong>Azure DevOps Status: 12 incidents<\/strong><br><br><strong>\u26a0\ufe0f Incidents that had a degraded impact &#8211; 12 incidents<\/strong><br><strong>\u231b Total time of incidents with degraded <strong>performance<\/strong> &#8211; 48 hours 45 min<\/strong><\/p>\n\n\n\n<p>Azure DevOps experienced 12 incidents which led to over 48 hours of degraded service across multiple regions in February 2024.<\/p>\n\n\n\n<p>The most prolonged disruption lasted over 26 hours, affecting extensions in the United States.<\/p>\n\n\n\n<p>Europe saw the highest concentration of issues, with multiple availability degradations impacting Boards, Repos, Pipelines, and Artifacts, particularly in West Europe.<\/p>\n\n\n\n<p>Other incidents included pipeline delays in the UK, a global issue preventing Pipeline Artifact downloads, and deprecated pipeline tasks becoming unusable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Critical Azure DevOps flaw could allow remote code execution<\/h2>\n\n\n\n<p>Microsoft addressed 73 security vulnerabilities and 2 actively exploited zero-days in February. Among the patches for different Microsoft products, there was one for Azure DevOps Server to address the CVE-2024-20667 security flaw tagged as \u201cimportant\u201d within the severity level.<\/p>\n\n\n\n<p>Using the vulnerability, an attacker could run unauthorized code on the user\u2019s Azure DevOps server and potentially compromise sensitive data or disrupt the user\u2019s services. However, there should be specific conditions for an attacker to succeed in an attack within this vulnerability:<\/p>\n\n\n\n<p>\u201c<em>Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability,<\/em>\u201d is stated in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20667\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft\u2019s security updates<\/a>.&nbsp;<\/p>\n\n\n\n<p>The February updates are essential for users to protect their Azure DevOps Server against this remote code execution bug.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-february-2024-patch-tuesday-fixes-2-zero-days-73-flaws\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping computer<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>JANUARY<\/strong><\/p>\n\n\n\n<p><strong><em>There is no full information available about the incidents in January.<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>After analyzing all the events that impacted Azure DevOps and thoroughly going through the <a href=\"https:\/\/status.dev.azure.com\/_history\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Azure DevOps Status<\/a> (here we managed to analyze only the period from February 2024 to December 2024), we counted that the service experienced 111 incidents of degraded performance, which gives us the total time of disruption &#8211; 826 hours and 02 minutes. Thus, Azure DevOps experienced some kind of disruption for about 103 working days, including an outage that took place in Brazil and the United States.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"917\" height=\"703\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/incidents_by_type_v2.png\" alt=\"\" class=\"wp-image-6196\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/incidents_by_type_v2.png 917w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/incidents_by_type_v2-300x230.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/incidents_by_type_v2-768x589.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/incidents_by_type_v2-400x307.png 400w\" sizes=\"(max-width: 917px) 100vw, 917px\" \/><\/figure><\/div>\n\n\n<p>Let\u2019s not forget that Azure DevOps is a secure platform and Microsoft takes all the necessary measures to make its services available. It patches vulnerabilities and provides updates to Azure DevOps users to know how to deal with them. Here we shouldn\u2019t forget about the Shared Responsibility Model that Microsoft follows. Within it, Microsoft is responsible for its services staying available while users should take care of their data and its security, availability, and recoverability.&nbsp;<\/p>\n\n\n\n<p>To have peace of mind that their source code and project data are secured, Azure DevOps users should implement <a href=\"https:\/\/gitprotect.io\/blog\/azure-devops-security-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">security best practices<\/a>, which include MFA, monitoring, backup, etc.<\/p>\n\n\n\n<p>Moreover, in view of meeting not only security but also compliance requirements, Azure DevOps users should consider backing up their DevOps and PM\u2019s environment. <a href=\"https:\/\/gitprotect.io\/azure-devops-backup.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitProtect backup and DR software for Azure DevOps<\/a> helps admins ensure that their company\u2019s critical data is accessible and recoverable in any event of disruption. The solution helps organizations to follow <a href=\"https:\/\/gitprotect.io\/blog\/azure-devops-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">backup best practices<\/a> that leave no place for data loss.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Ensure compliant Azure DevOps backup and recovery with a 14-day trial<\/strong><\/a><strong>\ud83d\ude80<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?month=2025-01\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[CUSTOM DEMO] Let\u2019s talk about how backup &amp; DR software for Azure DevOps can help you mitigate the risks<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The year 2024 is over, so it\u2019s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware &#8211; all of those were appearing in media headlines all year round. Thus, for the third year in a row, we\u2019ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian.&nbsp;<\/p>\n","protected":false},"author":8,"featured_media":6178,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,2],"tags":[],"class_list":["post-6177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure-devops","category-git-backup-101","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"The year 2024 is over, so it\u2019s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware &#8211; all of those were appearing in media headlines all year round. Thus, for the third year in a row, we\u2019ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-29T10:38:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T11:55:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\"},\"author\":{\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\"},\"headline\":\"The State of Azure DevOps Threat Landscape &#8211; 2024 In Review\",\"datePublished\":\"2025-01-29T10:38:10+00:00\",\"dateModified\":\"2025-07-03T11:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\"},\"wordCount\":2276,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png\",\"articleSection\":[\"Azure DevOps\",\"Git Backup 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\",\"name\":\"The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png\",\"datePublished\":\"2025-01-29T10:38:10+00:00\",\"dateModified\":\"2025-07-03T11:55:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png\",\"width\":2400,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The State of Azure DevOps Threat Landscape &#8211; 2024 In Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\",\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Daria Kulikova, Content Writer at GitProtect.io\"},\"description\":\"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/","og_locale":"en_US","og_type":"article","og_title":"The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io","og_description":"The year 2024 is over, so it\u2019s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware &#8211; all of those were appearing in media headlines all year round. Thus, for the third year in a row, we\u2019ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian.&nbsp;","og_url":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2025-01-29T10:38:10+00:00","article_modified_time":"2025-07-03T11:55:47+00:00","og_image":[{"width":2400,"height":1200,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png","type":"image\/png"}],"author":"Daria Kulikova, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Daria Kulikova, Content Writer at GitProtect.io","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/"},"author":{"name":"Daria Kulikova, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3"},"headline":"The State of Azure DevOps Threat Landscape &#8211; 2024 In Review","datePublished":"2025-01-29T10:38:10+00:00","dateModified":"2025-07-03T11:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/"},"wordCount":2276,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png","articleSection":["Azure DevOps","Git Backup 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/","url":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/","name":"The State of Azure DevOps Threat Landscape - 2024 In Review - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png","datePublished":"2025-01-29T10:38:10+00:00","dateModified":"2025-07-03T11:55:47+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/01\/azure-devops-stats2024.png","width":2400,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/the-state-of-azure-devops-threat-landscape-2024-in-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"The State of Azure DevOps Threat Landscape &#8211; 2024 In Review"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3","name":"Daria Kulikova, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Daria Kulikova, Content Writer at GitProtect.io"},"description":"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.","url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=6177"}],"version-history":[{"count":7,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6177\/revisions"}],"predecessor-version":[{"id":6925,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6177\/revisions\/6925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/6178"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=6177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=6177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=6177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}