A Step-by-Step Guide to Running a SAST Test
Insecure code has become one of the biggest threats to modern software development, and AI may be making it worse.…
Read More →
Insecure code has become one of the biggest threats to modern software development, and AI may be making it worse.…
Read More →
Undoubtedly one of the most notorious software supply chain attacks the software world has seen, the XZ attack sent shockwaves…
Read More →It’s already been four years since the high-profile SolarWinds attack, and yet the rate of software supply chain attacks is…
Read More →
Intro In the Black Hat talk last month titled “Reflections on Trust in the Software Supply Chain,” Jeremy Long, founder…
Read More →
What is tampering anyway? Tampering is the act of altering software to perform malicious intent. Tampering can be done by…
Read More →