I Want To Update But Have No Package

I Want To Update But Have No Package

  -You want to fix your supply chain vulnerability, but have no update available for your environment -Maintaining open-source packages is mostly done on a voluntary basis -Using old packages is just ...

The AI Supply Chain Is Not Impervious

AI was the leading story of 2023 – to provide some context, ChatGPT became Wikipedia’s most viewed article of 2023 – and it has been implemented in testing or production stages by ...

Supply Chain Attack Methodologies – It’s the Installer Now

”Supply chain attack” encompasses many different forms of attacks and exploits Yet another type was recently uncovered – malicious behavior in properly signed installers While this particular case was not Java specific, ...

“Everything” and the Node.js kitchen sink too

*The Supply Chain is vulnerable at all levels, from the code to the distribution *Node.js repository was effectively locked after a developer uploaded a malicious package It’s often hard to differentiate between ...

Supply Chain Attacks – Risk Perception vs Reality

Supply chain attacks have surged in recent years, gradually becoming a formidable threat in the cybersecurity landscape. Yet, despite their growing prevalence, there seems to be a disconnection between the perception and ...

The Dangerous Numbers Behind Supply Chain Attacks

Supply chain attacks have witnessed a staggering surge in recent years, morphing into a formidable threat in the cyber landscape. When businesses are increasingly reliant on third-party software and open-source components, supply ...

The Secure Java Developer’s Toolkit

Java remains one of the most popular and widely-used programming languages. It’s not just about writing and running Java programs, though. A typical Java developer working in Linux has an entire ecosystem ...

Supply Chain Attack Inception

There are many forms of supply chain attacks – repository hacking, developer initiated attacks, library tampering, domain hijacking, the list goes on – but an attack where the malware deliberately looks for ...