Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install
See how the attack works, what to look for, and how to remediate.
Famous Telnyx Pypi Package compromised by TeamPCP
TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer
Check and fix your install for the new LiteLLM PyPI compromise.
CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive
Deep dive into the self-spreading CanisterWorm.
Best Software Composition Analysis Providers: Top 5 in 2026
Explore key features of leading SCA providers.
Best Software Composition Analysis for Enterprise: Top 8 in 2026
Explore this guide to the best software composition analysis tools for large teams.
Top Tools for Automating SBOMs
Discover the top tools for automating SBOMs and how to create SBOMs effortlessly.
Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025
Learn what SCA tools do and how they help secure your open source dependencies.
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security
This post covers the attack flow, how it happened, and the importance of supply chain security.
More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Threat Hunting 101: Five Common Threats to Look For
Learn more about supply chain threats and where to find them.
Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.
Six More Top Tips For Holistic AppSec and Software Supply Chain Security
Learn how to strengthen your security posture with holistic approaches to application security and software supply chain security.
Six Top Tips For Holistic AppSec and Software Supply Chain Security
Discover six top tips for holistic application security and software supply chain security for long-term success.
Turnover, Relationships, and Tools in Cybersecurity
Discover effective strategies for handling security team turnover, maintaining tool efficiency, and fostering strong developer relationships.
What New Security Threats Arise from The Boom in AI and LLMs?
Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.