Software supply chain attacks are evolving as open source and AI-generated code introduce new third-party risks. Learn how ...
At this week's Black Hat Europe conference, two researchers urged developers to adopt a shared responsibility model for open ...
An open-source software, originally designed for hobbyist drones, powered a recent Ukrainian attack that allegedly destroyed a third of Russia’s strategic long-range bombers, a report has said. The ...
Supply-chain attacks have evolved considerably in the last two years going from dependency confusion or stolen SSL among others once common attacks to AI-backed social engineering and open-source ...
Open MPIC provides certificate authorities with an open-source framework for implementing multi-perspective validation, protecting against BGP hijacking attacks that threaten the web's trust ...
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories and allowed threat actors to publish malicious extensions in a supply chain attack.
Cybersecurity solutions and services provider Specter Ops Inc. today announced the release of BloodHound v8.0, the latest version of its open-source attack path management security platform. The new ...
GARTNER SECURITY & RISK MANAGEMENT SUMMIT — Washington, DC — Having awareness and provenance of where the code you use comes from can be a boon to prevent supply chain attacks, according to GitHub's ...