Back to blog

Open source security

5 Examples of Dependency Confusion Attacks

5 Examples of Dependency Confusion Attacks

Are you still running your package pipeline on default settings and grabbing libraries straight from public repos? Big yikes. That’s rolling out the red carpet for

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What if your most personal chats, the very foundation of your digital existence, were exposed?  Unfortunately, that’s precisely what happened with the Salt Typhoon Hack on

A Developer's Guide to Running an SCA Scan

A Developer’s Guide to Running an SCA Scan

Your IT infrastructure is a complicated network of systems and activities that generate massive volumes of data every second. Hidden within this data stream is the

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

You don’t control most of the code in your software. Unfortunately, that’s the reality of today. Open-source libraries, third-party components, and vendor integrations make up the

The Essential LLM Security Checklist

The Essential LLM Security Checklist [XLS Download]

Large language models (LLMs) are transforming how we work and are quickly becoming a core part of how businesses operate. But as these powerful models become

An In-depth Guide to the OWASP Mobile Top 10

An In-depth Guide to the OWASP Mobile Top 10

Your app is secure, right? Think again.  There are at least 10 vulnerabilities that could be lurking in your code, waiting to be exploited. This reality

Software supply chain risk assessment: 8 steps to a secure SDLC

Software supply chain risk assessment: 8 steps to a secure SDLC

Like any chain, a software supply chain contains many links. These links consist of every actor involved in the development & deployment of your code in

A Developer's Tutorial to Using NPM Audit for Dependency Scanning

A Developer’s Tutorial to Using NPM Audit for Dependency Scanning

Many developers overlook the risks lurking in third-party packages. Every package you add could harbor vulnerabilities, potentially exposing sensitive user data and granting unauthorized access to

10 Types of Vendor Related Risk Cloud Native Organizations Need to Manage

If you are a developer in the current cybersecurity climate, you already know your application’s security is paramount. But have you considered the risks associated with

Stop leaks at the source!