
A software supply chain meltdown: What we know about the XZ Trojan
Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Here's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Code bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery.

The FDA now requires medical device manufacturers to produce a software bill of materials to ensure supply chain security. Here’s what you need to know.

There are many reasons to consider a career in AppSec, but one stands out: Software supply attacks are creating job security and opportunity.

Why Relying on Sandboxes Alone Leaves You Exposed — And How Next-Gen Binary Analysis Closes the Gaps

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?

How to apply YARA rules for threat detection, searching, hunting and more.

Know the key challenges with software bills of materials, how tooling affects their usefulness — and how to make them actionable for better supply chain security.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial