
Developing trustworthy AI: 9 key threat categories
CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.
Read More about Developing trustworthy AI: 9 key threat categoriesCSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.
Read More about Developing trustworthy AI: 9 key threat categoriesThe new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.
Read More about CISA tool aims to boost security for software onboardingThe new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.
Read More about CISA tool aims to boost security for software onboardingA phishing campaign against maintainers resulted in malware distribution via Javascript in top open-source packages.
Read More about Crypto wallets targeted in widespread hack of npm, GitHubWith attacks on popular repositories on the rise, PyPI has moved to head off a common technique for duping developers. Here’s what it accomplishes — and where there’s room for improvement.
Read More about PyPI tackles domain resurrection: Why it matters — and what’s missingESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.
Read More about The future is here: AI-borne ransomware has arrivedHere are six lessons learned from the near-miss that was the Amazon Q Developer incident. Don't let luck be your security strategy.
Read More about How AWS averted an AI coding supply chain disasterIntegrated security in AI assistants could help to catch code flaws — but they are only one layer in a comprehensive AppSec strategy.
Read More about AI coding tools gain security — but the controls do not cut itScott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.
Read More about ‘The Immutable Laws of Security’ at 25: 5 corollaries for a new eraHere's how to integrate AI-specific risks into your existing security incident response (IR) playbook.
Read More about OWASP GenAI Incident Response Guide 1.0: How to put it to workApplication security pros need to be ready to cope with security at the speed of code. Here's how to get a handle on modern software risk.
Read More about The state of development: 5 AppSec action itemsThe new AI Vulnerability Scoring System (AIVSS) picks up where the Common Vulnerability Scoring System (CVSS) falls short.
Read More about OWASP AIVSS targets agentic AI riskPolicy as Code is emerging as a key area of focus for AppSec teams in the age of cloud-native development. But implementation can be daunting.
Read More about How to implement PaC for a more secure SDLCThe software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.
Read More about SharePoint zero-day: What we knowTriaging and patching, plus meeting compliance demands, all bog down modern software teams — and divert time away from development.
Read More about The true cost of CVEs: Go beyond vulnerabilitiesGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial