Explore >> Select a destination


You are here

deibert.citizenlab.ca
| | thehackernews.com
9.1 parsecs away

Travel
| | Millions of malicious "imageless" containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns.
| | cltc.berkeley.edu
8.8 parsecs away

Travel
| | On September 12, 2024, the Center for Long-Term Cybersecurity hosted a launch event for Enhancing Cybersecurity Resilience for Transnational Dissidents, a report authored by researchers from Citizen Lab,...
| | citizenlab.ca
6.8 parsecs away

Travel
| | This report reveals a campaign of reconnaissance, phishing, and malware operations that use content and domains made to mimic Chinese language news websites.
| | ortelius.io
27.7 parsecs away

Travel
| Ortelius for Post-Deployment Security to Jenkins As software supply chains grow more complex and vulnerabilities emerge faster than ever, Jenkins users face a critical challenge: "How do you keep your deployed applications secure after the build is complete?" Jenkins excels at automating builds, tests, and deployments. But what happens after software reaches production? Most CI/CD tools, including Jenkins, lose visibility once applications go live. This blind spot leaves teams vulnerable to newly disclosed CVEs, exploitable weaknesses that can appear days or weeks after deployment.