Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  Cycode software Blog  > 

2024-01-18 19:16
We live in a world filled with constant notifications. From medical devices to severe weather warnings on your phone to your car’s lane departure warning systems, automated alerts play… Read More
2023-12-06 09:58
Cycode is excited to announce the release of our State of ASPM 2024 report, the first ever report to analyze the state of application security and Application Security Posture Management (AS… Read More
2023-11-21 21:27
Thanksgiving is the perfect time of year to reflect on all the things we are truly grateful for. Here at Cycode, we try to practice gratitude every day. As we reflect what we are most thankf… Read More
2023-10-24 14:29
For security professionals, choosing the right approach to application security testing is crucial. This blog post navigates the differences between two popular methodologies: Software Compo… Read More
2023-10-03 11:02
Exposed credentials are one of the most abused methods for gaining initial access. Breaches such as the Zendesk breach have been started by employees’ compromised credentials. GitHub s… Read More
2023-10-03 08:09
Many organizations use CI/CD pipelines to enforce development or security policies. For example, a pipeline may check whether any vulnerable dependencies are included in the build. These pip… Read More
2023-08-09 09:39
In a recent cybersecurity incident, North Korean hackers targeted JumpCloud, an enterprise software company. Mandiant, CrowdStrike and SentinelOne attributed the breach to North Korea’… Read More
2023-07-17 13:52
Gerrit is a well-regarded, free code collaboration tool, primarily used for team code review. Its excellent integration with Git, a distributed version control system, supports a wide range… Read More
2023-06-06 14:29
Cycode is excited to announce the immediate availability of our new Software Bill of Materials (SBOM) feature. Cycode SBOM is a complementary technology to our Next-Gen Software Composition… Read More
2023-03-21 17:54
When considering open source risk, you immediately think of vulnerabilities that have led to high-profile breaches like Equifax’s. Though open source license violations grab fewer head… Read More
2023-02-15 13:40
Even though Software Bills of Materials (SBOMs) have been around for about 10 years, they have recently gained a lot of buzz in the software industry. This blog explores why everyone is sudd… Read More
2023-02-02 15:54
While many developers understand the risks associated with hardcoding credentials into code, when it comes to containers, understanding that risk is the exception, not the rule. As a result… Read More
2023-01-05 15:29
CircleCI was breached. If you are using this tool: Immediately rotate all stored secrets and environment variables in CircleCI. These secrets are the holy grail for attackers targeting CI sy… Read More
2022-11-10 17:13
Security doesn’t begin with developers, but they are often affected by security. In my career as a developer, I would say I spent roughly a week per quarter performing tasks to fulfill… Read More
2022-10-31 00:55
It is a time of ghouls, mischievous spirits, and David S. Pumpkins. In the spirit of Halloween, here are the top five scariest limitations of software composition analysis (SCA) tools that a… Read More
2022-10-24 18:50
GitHub Security Lab recently published a security advisory regarding a newly discovered vulnerability enabling Remote Code Execution (RCE) in Apache Commons Text. Affected versions of Apache… Read More
2022-07-11 18:10
The IconBurst attack is a software supply chain attack designed to grab data from apps and websites. This attack campaign seeks to install malicious NPM modules that harvest sensiti… Read More
2022-06-16 08:13
ISO 27001, formally known as ISO/IEC 27001, is designed to help organizations manage the security of financial information, intellectual property, employee details, and other assets… Read More
2022-05-22 17:51
CrateDepression is a software supply chain attack designed to target GitLab CI Pipelines by impersonating legitimate Rust packages and their developers. Since a GitHub user notified… Read More
2022-05-20 19:34
What is PCI DSS? Any financial institution, proprietor, or other entity that handles sensitive information must adhere to adequate security standards. Payment security is essential… Read More

Share the post

Cycode

×

Subscribe to Cycode

Get updates delivered right to your inbox!

Thank you for your subscription

×