
It only takes one line of code to ruin your day
They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

Relying on legacy functionalities comes with inherent security risks

One of the core tenets of computer science is code reuse.


The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

Tearing Down HWP Files To Expose a Trojan

When malware lasts longer than your washing machine

YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Enriching public threat intelligence

Typosquatting barrage on RubyGems software repository users
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial