Blog Series
SecureChain for Java
- No categories
OpenJDK vs. Oracle JDK: Which...
The key differences in OpenJDK vs. Oracle JDK lies in their licensing and support. Released in September 2021, Java 17 is currently the most widely used JDK (Java Development...
I Want To Update But...
-You want to fix your supply chain vulnerability, but have no update available for your environment -Maintaining open-source packages is mostly done on a voluntary basis -Using old packages...
The AI Supply Chain Is...
AI was the leading story of 2023 – to provide some context, ChatGPT became Wikipedia’s most viewed article of 2023 – and it has been implemented in testing or production...
Supply Chain Attack Methodologies –...
”Supply chain attack” encompasses many different forms of attacks and exploits Yet another type was recently uncovered – malicious behavior in properly signed installers While this particular case was not...
“Everything” and the Node.js kitchen...
*The Supply Chain is vulnerable at all levels, from the code to the distribution *Node.js repository was effectively locked after a developer uploaded a malicious package It’s often hard to...
Supply Chain Attacks – Risk...
Supply chain attacks have surged in recent years, gradually becoming a formidable threat in the cybersecurity landscape. Yet, despite their growing prevalence, there seems to be a disconnection between the...
The Dangerous Numbers Behind Supply...
Supply chain attacks have witnessed a staggering surge in recent years, morphing into a formidable threat in the cyber landscape. When businesses are increasingly reliant on third-party software and open-source...
The Secure Java Developer’s...
Java remains one of the most popular and widely-used programming languages. It’s not just about writing and running Java programs, though. A typical Java developer working in Linux has an...
Supply Chain Attack...
There are many forms of supply chain attacks – repository hacking, developer initiated attacks, library tampering, domain hijacking, the list goes on – but an attack where the malware deliberately...
Supply Chain Attacks: A Java...
The digital world thrives on interconnectedness, and nowhere is this more apparent than in the vast web of dependencies that form the backbone of modern software development. While dependencies are...
Unveiling the Complexity: An In-Depth...
In today’s software development landscape, understanding the Java supply chain infrastructure is not just an option — it’s a necessity. As Java developers, we interact with this supply chain every...