
Why devs and repos spill secrets
The Circle CI breach and other recent hacks expose why the secrets problem is so prolific. Here's what you need to know.
Read More about Why devs and repos spill secretsThe Circle CI breach and other recent hacks expose why the secrets problem is so prolific. Here's what you need to know.
Read More about Why devs and repos spill secretsWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npmReversingLabs researchers discovered dozens of malicious packages on Python Package Index that mimic popular libraries
Read More about Developers beware: Imposter HTTP libraries lurk on PyPIThis is not a drill: Denis Pushkarev has big debts — and his code is EVERYWHERE
Read More about Core-JS: Beware hidden dependencies from indebted Russian developersModeled after MITRE ATT&CK, OSC&R aims to improve software supply chain security. Experts share its hits — and misses.
Read More about OSC&R targets software supply chain attacksReversingLabs’ YARA detection rule for Lorenz can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting LorenzWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowessCISA's C-SCRM turns a page on a busy year for federal software supply chain security directives and guidance. Will it move the needle?
Read More about Less talk, more action: High hopes for CISA's new C-SCRM officeBeep, boop; hope, hype: Generative AI isn't ready for prime time. So don't play games with your software development
Read More about Lessons from ChatGPT, Bing AI, Bard and Copilot: Chatty AI is just a toySoftware teams face growing supply chain complexity and threats. Here's why your application security team needs to go beyond open source and vulnerabilities.
Read More about SCA is necessary, but AppSec must evolve to tackle software supply chain securityForrester has assessed that software composition analysis (SCA) has grown into an established market. Here are the highlights for teams tasked with software supply chain security
Read More about Software composition analysis and the evolution of application securityThe Forrester Software Composition Analysis Landscape, Q1 2023 report provides a competitive analysis of SCA tools. Here's how they deliver (and miss) on software supply chain security
Read More about The SCA tools landscape and what it means to software supply chain securitySoftware bills of materials (SBOMs) deliver a ground truth for software teams. Here's how they can protect their supply chains.
Read More about Why knowing the "ground truth" is key to software securityAabquerys is a malicious npm package discovered typosquatting on a legitimate module that downloads malicious components
Read More about Open-source repository malware sows HavocWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: CISA operationalizes software supply chain security, GuLoader targets e-commerceGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial