Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a critical vulnerability identified as CVE-2021-44228 that carries ...
An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
YesWeHack will support the Commission's Dirctorate-General for Digital Services (DIGIT) in organising a series of bug bounty programs as well as vulnerability disclosure policies (VDPs). A roster of ...
Alan examines why the software supply chain has become the new perimeter in cloud-native security. From SBOMs to SLSA and Sigstore, discover how leaders can defend against attacks that target ...
AI is reshaping offensive security tactics and challenging defenders to respond at unprecedented speed. When: Nov. 20, 1:00-2 ...
Technical permafrost cannot quickly integrate new technologies like AI, causing missed market opportunities. Upgrades are like defusing bombs; a small mistake can lead to system crashes. Outdated ...
Java platform provider Azul and container security company Chainguard have formed a strategic partnership to deliver secure container images for Java applications, addressing enterprise concerns about ...
Security systems observed a sharp increase in API incidents in the first half of 2025, with over 40,000 security events targeting more than 4,000 environments globally. These incidents indicate that ...