11 Ways To Defend The Software Supply Chain From Code Signing Abuse

11 Ways To Defend The Software Supply Chain From Code Signing Abuse

Recently, a hacker attempted to install a tool for hacking into a customer’s computer by using a fake code signing certificate impersonating the cybersecurity firm Emsisoft. The attacker attempted to spoof or ...
zero-day, vulnerabilities, zero-trust app hardware zero-trust prepare

Google: Poor Software Fixes Cause Half of all Zero-Days

Researchers from Google’s Project Zero examined 18 zero-day vulnerabilities exploited by hackers this year before a patch was available; they found that half those vulnerabilities could have been avoided if software vendors ...
Security Boulevard

5 Critical Code Vulnerabilities To Avoid At All Cost

The foundation of every software, application, or website is its code. These days, every organization and business around the world uses a wide range of applications and software for everyday operations. A ...
Microsoft Colonial Pipeline, lessons, vulnerabilities pipedream supply chains CI/CD pipeline dev environment Linux

How to Choose Linux Kernel Live Patching Software

In 1991, two unrelated events occurred, each the promise of two very different kinds of freedom: the death of the Cold War and the birth of Linux. Kernel live patching arrived in ...
Security Boulevard
Contrast Security

Contrast Security Advances DevSecOps

Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning process. Surag Patel, chief strategy officer for Contrast Security, said Route Intelligence ...
Security Boulevard
Rhysida ransomware decryptor

WhiteSource Adds Python Support to Vulnerability Discovery Tool

WhiteSource today announced it has extended to reach of its tool for scanning for vulnerabilities in open source application code to include support for the Python programming language. Jeffrey Martin, director of ...
Security Boulevard
data leakage

Survey: Third-Party Code Proves Vulnerable

A recent survey of 307 IT professionals conducted Osterman Research on behalf of PerimeterX, a provider of cybersecurity tools for web applications, suggests there’s a lot of third-party code running on websites ...
Security Boulevard