
The future is here: AI-borne ransomware has arrived
ESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.
Learn More about The future is here: AI-borne ransomware has arrivedESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.
Learn More about The future is here: AI-borne ransomware has arrivedRL has discovered a loophole on VS Code Marketplace that allows threat actors to reuse legitimate, removed package names for malicious purposes.
Learn More about Loophole allows threat actors to claim VS Code extension namesCycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.
Learn More about Rise of the xBOM: The new go-to tool for software securityESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.
Read More about The future is here: AI-borne ransomware has arrivedRL has discovered a loophole on VS Code Marketplace that allows threat actors to reuse legitimate, removed package names for malicious purposes.
Read More about Loophole allows threat actors to claim VS Code extension namesDeveloper Productivity Engineering provides a framework to boost code production and creativity — and can help to improve application security.
Read More about How DPE can speed development — and boost your AppSecHere are six lessons learned from the near-miss that was the Amazon Q Developer incident. Don't let luck be your security strategy.
Read More about How AWS averted an AI coding supply chain disasterIntegrated security in AI assistants could help to catch code flaws — but they are only one layer in a comprehensive AppSec strategy.
Read More about AI coding tools gain security — but the controls do not cut itScott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.
Read More about ‘The Immutable Laws of Security’ at 25: 5 corollaries for a new eraHere's how to integrate AI-specific risks into your existing security incident response (IR) playbook.
Read More about OWASP GenAI Incident Response Guide 1.0: How to put it to workThe eslint-config-prettier package exposed more than 10,000 dependent projects. The incident highlights the growing risks in automated dependency updating.
Read More about Compromised npm package threatens developer projectsResearchers at Black Hat discussed how these tools can leave development teams vulnerable to hacks like remote-code execution.
Read More about Speed kills: AI coding tools revive old-school hacksLeading firms are using DevEx to achieve application security gains at speed. Here's how it works — and how to get started.
Read More about Move over, DevSecOps — DevEx is the new darlingApplication security pros need to be ready to cope with security at the speed of code. Here's how to get a handle on modern software risk.
Read More about The state of development: 5 AppSec action itemsThe new AI Vulnerability Scoring System (AIVSS) picks up where the Common Vulnerability Scoring System (CVSS) falls short.
Read More about OWASP AIVSS targets agentic AI riskPolicy as Code is emerging as a key area of focus for AppSec teams in the age of cloud-native development. But implementation can be daunting.
Read More about How to implement PaC for a more secure SDLCThe software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.
Read More about SharePoint zero-day: What we knowTriaging and patching, plus meeting compliance demands, all bog down modern software teams — and divert time away from development.
Read More about The true cost of CVEs: Go beyond vulnerabilitiesGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial