You are here |
blog.phylum.io | ||
| | | |
scribesecurity.com
|
|
| | | | Explore recent software supply chain attacks, their impact, and learn effective strategies for prevention. Discover how you can protect your organization | |
| | | |
snyk.io
|
|
| | | | On the 29th of March 2024, the high-stakes investment and prolonged campaign to plant a backdoor in the Linux software library liblzma to gain access to multiple operating systems via Linux distributions was carried out by a malicious actor. | |
| | | |
blog.gitguardian.com
|
|
| | | | The open-source world narrowly escaped a sophisticated supply-chain attack that could have compromised countless systems. A stark reminder of the necessity of vigilant monitoring and rigorous vetting within the open-source ecosystem to maintain trust and security. | |
| | | |
www.hivesystems.com
|
|
| | NIST recently updated its decades-old password security guidance after years of scrutiny, skepticism, and flat-out ineffectiveness finally forced the agency to address practical security considerations and realistic threats while abandoning what many considered to be ineffective security theater. |