
Malicious helpers: VS Code Extensions observed stealing sensitive information
Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Software complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Here's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Code bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery.

The FDA now requires medical device manufacturers to produce a software bill of materials to ensure supply chain security. Here’s what you need to know.

There are many reasons to consider a career in AppSec, but one stands out: Software supply attacks are creating job security and opportunity.

Why Relying on Sandboxes Alone Leaves You Exposed — And How Next-Gen Binary Analysis Closes the Gaps

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial