PinnedYoad FeketeinBlindSpot SecuritySBOM is important, but don’t rely on it to prevent the next software supply chain attackDetecting MALICIOUS code in open-source packages is not that trivial.Feb 22, 20233Feb 22, 20233
Yoad FeketeinBlindSpot SecurityBinary-To-Source Validation And Keeping Up With An Undetectable ThreatIntroSep 6, 2023Sep 6, 2023
Yoad FeketeinBlindSpot Security3CX Software Supply Chain Breach — How can we prevent such attacks?It happened again. Another software supply chain attack distributing malware to many customers.May 1, 2023May 1, 2023