You are here |
www.reversinglabs.com | ||
| | | |
www.wiz.io
|
|
| | | | CI/CD pipelines, as an essential part of the software development process, are an attractive target to malicious actors. Based on our research of cloud environments, we share common misconfigurations and provide tips on how to remediate them in order to prevent supply-chain attacks. | |
| | | |
www.sonatype.com
|
|
| | | | Open source malware is on the rise. Learn how to detect threats, comply with federal mandates, and secure your software supply chain with proactive security measures. | |
| | | |
www.uptycs.com
|
|
| | | | Explore the foundations of hybrid cloud security, including core strategies, emerging threats, and the role of CNAPP in securing hybrid cloud environments. | |
| | | |
blog.phylum.io
|
|
| | At the end of March 2024, a major software supply chain attack was identified: some upstream forks of the popular xz/liblzma library that underpins the massively popular OpenSSH Server was compromised. A rogue contributor appears to have worked to influence the maintainers of the library, adding in seemingly innocuous |