
Federal security guidance: Been there, done that
CISA and NSA issued security guidance on continuous integration/continuous delivery (CI/CD) environments — but missed an opportunity to escalate the conversation.

CISA and NSA issued security guidance on continuous integration/continuous delivery (CI/CD) environments — but missed an opportunity to escalate the conversation.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

With CycloneDX 1.5, OWASP is introducing a number of new types of SBOMs. Here's a full run-down on changes — and what they mean for software transparency.

Meet ReversingLabs Software Supply Chain Security's newest feature: Levels.

The privacy of user data is one thing — but security of that data is equally important.

Here's what you need to know about third-party risk management — and why to prioritize comprehensive supply chain security.

Automations, integrations, and usability improved

Tracking StealC's Rise: How YARA Rules Help Uncover a New Breed of Information Stealers

“Write once, infect everywhere” might be the new cybercrime motto, with newly discovered campaigns showing malicious npm packages powering phishing kits and supply chain attacks.
.webp&w=3840&q=75)
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Here's how to use basic HTML to dress up your security incidents

C’mon, dev teams — it's about time to get serious about memory safety, XSS and SQLi.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

It’s a dog-eat-dog world ... Bug allows bad actor to manipulate URLs and extract data. Note to devs: Avoid consecutive object references and add entropy.

Hackers are having a field day targeting developers with supply chain attacks, which open doors to other compromises. Here's why — and what to do about it.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial