Explore >> Select a destination


You are here

www.reversinglabs.com
| | www.wiz.io
8.8 parsecs away

Travel
| | CI/CD pipelines, as an essential part of the software development process, are an attractive target to malicious actors. Based on our research of cloud environments, we share common misconfigurations and provide tips on how to remediate them in order to prevent supply-chain attacks.
| | www.sonatype.com
9.5 parsecs away

Travel
| | Open source malware is on the rise. Learn how to detect threats, comply with federal mandates, and secure your software supply chain with proactive security measures.
| | www.uptycs.com
8.9 parsecs away

Travel
| | Explore the foundations of hybrid cloud security, including core strategies, emerging threats, and the role of CNAPP in securing hybrid cloud environments.
| | blog.phylum.io
55.7 parsecs away

Travel
| At the end of March 2024, a major software supply chain attack was identified: some upstream forks of the popular xz/liblzma library that underpins the massively popular OpenSSH Server was compromised. A rogue contributor appears to have worked to influence the maintainers of the library, adding in seemingly innocuous