Blog Series
supply chain
Supply Chain Attack Methodologies –...
”Supply chain attack” encompasses many different forms of attacks and exploits Yet another type was recently uncovered – malicious behavior in properly signed installers While this particular case was not...
“Everything” and the Node.js kitchen...
*The Supply Chain is vulnerable at all levels, from the code to the distribution *Node.js repository was effectively locked after a developer uploaded a malicious package It’s often hard to...
Supply Chain Attacks – Risk...
Supply chain attacks have surged in recent years, gradually becoming a formidable threat in the cybersecurity landscape. Yet, despite their growing prevalence, there seems to be a disconnection between the...
The Secure Java Developer’s...
Java remains one of the most popular and widely-used programming languages. It’s not just about writing and running Java programs, though. A typical Java developer working in Linux has an...
Supply Chain Attack...
There are many forms of supply chain attacks – repository hacking, developer initiated attacks, library tampering, domain hijacking, the list goes on – but an attack where the malware deliberately...
The Risks of an Open-Source...
Open-source software has emerged as a crucial component of the software development ecosystem. It has gained widespread adoption among developers worldwide, owing to its benefits – such as cost-efficiency, adaptability,...