DEV Community

# supplychainsecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What LucidShark Would Have Caught Before the TanStack Attack Landed

What LucidShark Would Have Caught Before the TanStack Attack Landed

Comments
7 min read
Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers

Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers

Comments
9 min read
AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

Comments
8 min read
Supply Chain Security Proxy: Move Beyond Vulnerability Scanning

Supply Chain Security Proxy: Move Beyond Vulnerability Scanning

Comments
8 min read
GitHub Actions Security: How to Stop Secret Leaks in CI/CD

GitHub Actions Security: How to Stop Secret Leaks in CI/CD

Comments
7 min read
How Attackers Turned Trivy Into a Weapon Against Cisco

How Attackers Turned Trivy Into a Weapon Against Cisco

Comments
4 min read
Cisco's Source Code Breach Was Structural, Not Accidental

Cisco's Source Code Breach Was Structural, Not Accidental

Comments
3 min read
Governing Security in the Age of Infinite Signal – From Discovery to Control

Governing Security in the Age of Infinite Signal – From Discovery to Control

Comments
7 min read
Supply chain security for dependencies

Supply chain security for dependencies

Comments
3 min read
JPMorgan Just Published a Cyber To-Do List and Snyk Covers 8 of the 10 Items. How do you stack up?

JPMorgan Just Published a Cyber To-Do List and Snyk Covers 8 of the 10 Items. How do you stack up?

Comments
6 min read
Supermicro GPU Smuggling: What the Indictment Reveals

Supermicro GPU Smuggling: What the Indictment Reveals

Comments
7 min read
The Vulnerability Scanner That Became the Vulnerability

The Vulnerability Scanner That Became the Vulnerability

1
Comments 2
2 min read
How to Detect and Recover From a Compromised Container Scanner

How to Detect and Recover From a Compromised Container Scanner

Comments
5 min read
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

1
Comments
9 min read
Should RubyGems/Bundler Have a Cooldown Feature?

Should RubyGems/Bundler Have a Cooldown Feature?

53
Comments 5
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.