
Ransomware 2025: Infostealers on the March
RL’s Ransomware Feed data from the first half of the year shows a jump in early-stage threats like infostealers — and a drop in Trojans.

RL’s Ransomware Feed data from the first half of the year shows a jump in early-stage threats like infostealers — and a drop in Trojans.

A phishing campaign against maintainers resulted in malware distribution via Javascript in top open-source packages.

With attacks on popular repositories on the rise, PyPI has moved to head off a common technique for duping developers. Here’s what it accomplishes — and where there’s room for improvement.

RL discovered how the crypto contracts were abused — and how this incident is tied to a larger campaign to promote malicious packages on top repositories.

ESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.

RL has discovered a loophole on VS Code Marketplace that allows threat actors to reuse legitimate, removed package names for malicious purposes.

Developer Productivity Engineering provides a framework to boost code production and creativity — and can help to improve application security.

Here are six lessons learned from the near-miss that was the Amazon Q Developer incident. Don't let luck be your security strategy.

Integrated security in AI assistants could help to catch code flaws — but they are only one layer in a comprehensive AppSec strategy.

Scott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.

Here's how to integrate AI-specific risks into your existing security incident response (IR) playbook.

The eslint-config-prettier package exposed more than 10,000 dependent projects. The incident highlights the growing risks in automated dependency updating.

Researchers at Black Hat discussed how these tools can leave development teams vulnerable to hacks like remote-code execution.

Leading firms are using DevEx to achieve application security gains at speed. Here's how it works — and how to get started.

Application security pros need to be ready to cope with security at the speed of code. Here's how to get a handle on modern software risk.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial