We’ve all heard that a physical chain is only as strong as its weakest link. A similar truth applies in software development: A software supply chain is only as secure as its weakest link. While it’s ...
According to the firm’s latest supply chain security report, there was a 73% increase in detections of malicious open-source packages in 2025. The past year also saw a huge jump in the scope of ...
AI adoption has skyrocketed as organizations strive to harness machine learning (ML) and artificial intelligence (AI) to drive efficiency and innovation. However, with the rapid adoption of AI comes ...
Shai-Hulud is the worst-ever npm JavaScript attack. This software supply chain worm attack is still ongoing. Here are some ways you can prevent such attacks. For those of you who aren't Dune fans, ...
Synopsys has introduced Black Duck Supply Chain Edition, a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code ...
Generative artificial intelligence (GenAI) might be good at drafting business emails, but it is dangerously bad at writing software code. Malicious actors are exploiting AI-fabricated software ...
The General Services Administration has awarded nine companies positions on a potential 10-year, $919.7 million blanket purchase agreement covering supply chain risk illumination software tools and ...
In 2011, Marc Andreessen coined a phrase we're now all familiar with: "Software is eating the world." More than 13 years later, the expression still rings true. The world runs on software, and each ...
RALEIGH, N.C.--(BUSINESS WIRE)--Red Hat, Inc., the world's leading provider of open source solutions, today announced updates to Red Hat Trusted Software Supply Chain. These solutions advance the ...
Stranger Things concept of the “Upside Down” is a useful way to think about the risks lurking in the software we all rely on.
A supply chain attack targeting key components of the Ethereum development ecosystem has affected the Nomic Foundation and Hardhat platforms. The attackers infiltrated the ecosystem using malicious ...
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk insecure VPN appliance pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and ...