Backdoor in XZ Utils That Almost Happened

Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s ...

Eclypsium and Second Front Announce Partnership to Enhance Security in the Digital Supply Chain of the Department of Defense

Portland, OR – February 27, 2024 – Eclypsium, the leader in digital supply chain security for enterprise hardware, firmware and software infrastructure, and Second Front Systems (2F), whose mission is to accelerate ...
supply chain software

Malicious Packages in npm, PyPI Highlight Supply Chain Threat

Software developers are being targeted with malicious packages in npm and PyPI as threat groups launch software supply-chain attacks ...
Security Boulevard
AI code fixing

Report: Cyberattacks Against Software Supply Chains Become More Targeted

Phylum found an increase in the discovery of malicious packages targeting the software supply chains of specific organizations ...
Security Boulevard

Enhancing trust for SGX enclaves

By Artur Cygan Creating reproducible builds for SGX enclaves used in privacy-oriented deployments is a difficult task that lacks a convenient and robust solution. We propose using Nix to achieve reproducible and ...

Celebrating our 2023 open-source contributions

At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about ...

Supply Chain Attack Methodologies – It’s the Installer Now

”Supply chain attack” encompasses many different forms of attacks and exploits Yet another type was recently uncovered – malicious behavior in properly signed installers While this particular case was not Java specific, ...

Internet freedom with the Open Technology Fund

By Spencer Michaels, William Woodruff, Jeff Braswell, and Cliff Smith Trail of Bits cares about internet freedom, and one of our most valued partners in pursuit of that goal is the Open ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

The Role of XBOMs in Supporting Cybersecurity

SBOMs aren’t the only bills of materials that are necessary for the protection of your tech stack. XBOMs are growing in importance ...
Security Boulevard