
What is the xBOM?
Understand the difference between the SBOM and xBOM — and how it impacts software supply chain security.
Read More about What is the xBOM?Understand the difference between the SBOM and xBOM — and how it impacts software supply chain security.
Read More about What is the xBOM?The latest Data Breach Investigations Report puts the focus squarely on third-party risk. Here’s what you need to know.
Read More about Verizon 2025 DBIR: Third-party software risk takes the spotlightThe CVE's challenges mean it's time to get off the vulnerability hamster wheel and modernize your risk program.
Read More about Changes to CVE program are a call to action on your AppSec strategyML attacks are evolving, putting mitigation a step behind. Here’s what to focus on — and why traditional AppSec tooling is not up to the job.
Read More about NIST's adversarial ML guidance: 6 action items for your security teamWhile the state of cybersecurity careers is confusing, key trends are driving companies to think big-picture — and outside of traditional roles.
Read More about The cybersecurity job market is complicated: 3 key insightsQuantum random number generators can make software — including software development secrets — more secure. Here's how it works.
Read More about Quantum delivers really random numbers: How that boosts AppSecRL researchers have identified yet another npm package that uses malicious patching of local software to hijack cryptocurrency transfers.
Read More about Atomic and Exodus crypto wallets targeted in malicious npm campaignVibe coding — AI coding using prompt engineering — is making application security more challenging. Here's what you need to know.
Read More about Vibe coding: What automating development means for AppSecSoftware supply chain risks from artificial intelligence and machine learning are getting real. Here are key insights from RL’s new report.
Read More about The race to secure the AI/ML supply chain is on — get out frontRL researchers detected two Python libraries that are designed to steal sensitive data while posing as fixes for a popular cryptocurrency library.
Read More about Malicious Python packages target popular Bitcoin libraryMore cracks in the NVD emerge, making the CVE system less useful. Shift your approach to keep up with software risk.
Read More about CVEs lose relevance: Get proactive — and think beyond vulnerabilitiesThe Open Source Secure Baseline provides a framework for securing OSS development — but it could breed complacency.
Read More about OpenSSF guidelines encourage OSS developers to build securelyThe Rules File Backdoor attack method is pernicious — and one that can be easily exploited with the rise of 'vibe coding' and agentic AI.
Read More about AI coding tools weaponized: What your AppSec team needs to knowFor the first time, RL researchers discover malicious locally-installed npm packages infecting other legitimate packages.
Read More about Malware found on npm infecting local package with reverse shellTarget on back-alert: Open source was increasingly exploited in attacks on cryptocurrency infrastructure and apps in 2024.
Read More about Crypto malware attacks: 23 supply chain incidents set off alarmsGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial