
Lessons from the Mercedes-Benz GitHub source code leak
Here's what we know about the automaker's latest secrets breach — and lessons your security team can draw from it.

Here's what we know about the automaker's latest secrets breach — and lessons your security team can draw from it.

New revelations show Russia’s SVR has stepped up cyber-espionage. They also spotlight how public companies are on the hook with the SEC’s disclosure laws.

Here are the key takeaways from the threat research — and why you need to evolve your application security approach with complex binary analysis and reproducible builds.

The Sunburst hack of SolarWinds put software supply chain attacks on everyone’s radar. But they aren’t new. Here’s an abbreviated history of key attacks and compromises.

ReversingLabs has released its annual report covering the state of software supply chain security. Learn top trends and get unique insights.

To cope in a new era of software supply chain attacks, application security must make a giant leap forward to modern practices and tooling.

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

The government added important new guidance in 2023. Get up to speed — and see our interactive timeline of recent attacks to stay ahead of them in 2024.

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

The analyst firm Gartner® released a new report on software supply chain risk that recommends identification of malware or malicious code.

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.
.webp&w=3840&q=75)
To advance the state of software supply chain security and better mitigate risk, the Enduring Security Framework group has highlighted the need for binary analysis and reproducible builds.

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

U.K. and U.S. cyber-watchdogs say to start with Secure by Design — but don't stop there. Here are key takeaways from their new guidelines.

SolarWinds, Codecov, and Kaseya showed how adversaries with access to a development environment can wreak havoc. Multifactor authentication is key, but it's not an "end-all solution."
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial