The Definitive Guide to Vulnerability Reachability Analysis – Part 2
Writing secure code in today’s digital landscape is more important than ever. Following up on the first part of…
Read More →
Writing secure code in today’s digital landscape is more important than ever. Following up on the first part of…
Read More →It’s already been four years since the high-profile SolarWinds attack, and yet the rate of software supply chain attacks is…
Read More →
The Microsoft Threat Intelligence team suspects that the Lazarus group is behind a new attack on Cyberlink, a Taiwanese multimedia…
Read More →
Intro In the Black Hat talk last month titled “Reflections on Trust in the Software Supply Chain,” Jeremy Long, founder…
Read More →
What is tampering anyway? Tampering is the act of altering software to perform malicious intent. Tampering can be done by…
Read More →
It started a while back. A software bill of materials (SBOM) was a unique idea put forth as a way…
Read More →
It happened again. Another software supply chain attack distributing malware to many customers. 3CX’s VoIP platform is widely used by…
Read More →