Explore >> Select a destination


You are here

blog.adolus.com
| | www.sonatype.com
1.7 parsecs away

Travel
| | Open source malware is on the rise. Learn how to detect threats, comply with federal mandates, and secure your software supply chain with proactive security measures.
| | openssf.org
1.3 parsecs away

Travel
| | [AI summary] A backdoor vulnerability (CVE-2024-3094) was discovered in the xz package, allowing potential remote system compromise through compromised software supply chain practices.
| | www.synopsys.com
2.4 parsecs away

Travel
| | Estimated Read Time: 5 mins - Understand the importance of a Software Bill of Materials (SBOM) and how it helps manage security, license, and operational risks in open source usage.
| | www.lasso.security
9.7 parsecs away

Travel
| Discover how to identify and mitigate supply chain vulnerabilities that pose security threats to LLMs and enterprise GenAI environments.