An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
Comet, Perplexity's new AI-powered web browser, recently suffered from a significant security vulnerability, according to a blog post last week from Brave, a competing web browser company. The ...
The vulnerability can let installed mobile apps access SMS/MMS data on a OnePlus phone without asking for user permission, ...
A stalkerware maker with a history of multiple data leaks and breaches now has a critical security vulnerability that allows anyone to take over any user account and steal their victim’s sensitive ...
A Dune-inspired worm recently hit CrowdStrike and npm, infecting hundreds of packages. Here's what happened - and how to protect your code.
Process improvements and a closer look at funding streams will provide far more protection for the open source software we ...
The majority of OnePlus phones in use today may be vulnerable to a security flaw that leaves SMS and MMS data exposed, and it ...
The technology leaders who successfully navigate this landscape will be those who recognize that AI deployment is not simply ...
Libraesva has addressed a vulnerability in its integrated email security platform that has been exploited in the wild.
Alan examines why the software supply chain has become the new perimeter in cloud-native security. From SBOMs to SLSA and Sigstore, discover how leaders can defend against attacks that target ...