Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the worldโs most widespread programming languages has shone a light on why the method we use to search for security issues in software matters.
The access token, discovered by the JFrog Security Research team in July, had administrator access to Pythonโs, PyPIโs and Python Software Foundationโs software repositories in software developer platform GitHub. It was leaked in a public Docker container hosted on Docker Hub.
The research team, which scans public software repositories for malicious packages and leaked secrets as a service to the coding ...
The Voice of Cyberยฎ
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Too often, having strong data processes can be seen as a โnice to haveโ. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved ...
In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing ...
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business ...
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate ...
With deep fakes becoming an increasing cybersecurity issue, there are seven key strategies that organisations can follow to reduce their chances of falling victim to an attack.
Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to completely eliminate the people problem.
In The News
Sort By
- Date
- Title
Sophos recently announced that it has once again been named a Leader in the 2024 Gartnerยฎ Magic Quadrantโข for Endpoint Protection Platforms (EPP). This is the 15th ...
Google Distributed Cloud architecture integrates intelligent data infrastructure to drive secure AI innovation
Sydney, Australia (2 October 2024)โSixty-four percent of cybersecurity professionals in Australia say their role is more stressful now than it was five years ago, according ...
This Cyber Security Awareness Month, would-be homebuyers are being warned to protectย their cash this Spring selling season, following a string of property-related ...
"Today's vulnerability management practices are often inadequate to address the sheer volume and complexity of threats," said Jeff Foresman, President of Services at ...
SYDNEY, Australia, 2 October 2024 โLogicMonitor, the leading SaaS-based hybrid observability platform powered by AI, today announced its successful completion of the ...
Podcasts On TECHNOLOGY