|
You are here |
blog.voltone.net | ||
| | | | |
www.sonatype.com
|
|
| | | | | Crypto stealers are posing as IP checker utilities on npm, targeting Windows, Linux and macOS users with new open source malware campaigns. | |
| | | | |
openssf.org
|
|
| | | | | [AI summary] The article discusses the growing threat of software supply chain compromises, using the 3CX incident as a case study, and highlights the need for advanced security measures like static binary analysis to detect and prevent such attacks. | |
| | | | |
tomrenner.com
|
|
| | | | | Anyone writing code professionally in December 2021 will remember the "fun" of the Log4J vulnerability. For those that weren't - this was a critical security error that allowed attackers to run any code they wanted on your servers. The root cause was a logging library, Log4J, that is used by most projects that are writting in Java. It's usually used to write code something like: log.info("Process completed successfully"); which will then appear in your logs, allowing you to track your application's behaviour. Pretty innocuous stuff. | |
| | | | |
www.reco.ai
|
|
| | | Hear from SaaS security experts on the effectiveness of the National Cybersecurity Strategy to help organizations secure their SaaS applications as we approach the one-year anniversary. | ||