Explore >> Select a destination


You are here

blog.voltone.net
| | www.sonatype.com
5.0 parsecs away

Travel
| | Crypto stealers are posing as IP checker utilities on npm, targeting Windows, Linux and macOS users with new open source malware campaigns.
| | openssf.org
6.5 parsecs away

Travel
| | [AI summary] The article discusses the growing threat of software supply chain compromises, using the 3CX incident as a case study, and highlights the need for advanced security measures like static binary analysis to detect and prevent such attacks.
| | tomrenner.com
6.4 parsecs away

Travel
| | Anyone writing code professionally in December 2021 will remember the "fun" of the Log4J vulnerability. For those that weren't - this was a critical security error that allowed attackers to run any code they wanted on your servers. The root cause was a logging library, Log4J, that is used by most projects that are writting in Java. It's usually used to write code something like: log.info("Process completed successfully"); which will then appear in your logs, allowing you to track your application's behaviour. Pretty innocuous stuff.
| | www.reco.ai
13.6 parsecs away

Travel
| Hear from SaaS security experts on the effectiveness of the National Cybersecurity Strategy to help organizations secure their SaaS applications as we approach the one-year anniversary.