Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the worldโs most widespread programming languages has shone a light on why the method we use to search for security issues in software matters.
The access token, discovered by the JFrog Security Research team in July, had administrator access to Pythonโs, PyPIโs and Python Software Foundationโs software repositories in software developer platform GitHub. It was leaked in a public Docker container hosted on Docker Hub.
The research team, which scans public software repositories for malicious packages and leaked secrets as a service to the coding ...
The Voice of Cyberยฎ
Supply Chain
Supply Chain cybersecurity refers to the measures and practices implemented to secure the interconnected network of organisations and processes involved in the production and distribution of goods and services.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโs, PyPIโs and Python Software Foundationโs ...
. Our dependency on open-source component is going to increase over time and implementing these five steps will help secure your organisation's software supply chain.
Over 2023, weโve seen what I like to call the โverticalisation of cybersecurityโ taking effect, in that cybersecurity has finally taken centre stage in business discussions. ...
In The News
Sort By
- Date
- Title
Diligent AI-powered reports build on history of industry experience to solve major compliance pain points
New Report from BlueVoyant Shows Progress in Third-Party Cyber Risk Management, But Breaches Persist
โMore organisations than any previous year indicated that their primary focus is no longer on awareness of the third-party risk management problem or adoption of a program, ...
Australiaโs cloud security lags as organisations fail to prioritise the software supply chain
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%
Additional findings of high expected AI ...
SYDNEY/AUCKLAND, 28 May 2024 โ New research from LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy ...
"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and ...
Podcasts On Supply Chain
No results found.