An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
Alan examines why the software supply chain has become the new perimeter in cloud-native security. From SBOMs to SLSA and Sigstore, discover how leaders can defend against attacks that target ...
AI is reshaping offensive security tactics and challenging defenders to respond at unprecedented speed. When: Nov. 20, 1:00-2 ...
Inspect your GitHub account for a repository named “Shai-Hulud.” The malware automatically creates this repo to store exfiltrated secrets. If it exists, remove it immediately, and carefully review its ...
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up?
Some results have been hidden because they may be inaccessible to you
Show inaccessible results