Homepage
Open in app
Sign in
Get started
BlindSpot Security
Follow
Binary-To-Source Validation And Keeping Up With An Undetectable Threat
Binary-To-Source Validation And Keeping Up With An Undetectable Threat
Intro
Yoad Fekete
Sep 6, 2023
Tampering Detection AI Engine — How to prevent the next Software Supply Chain Attack
Tampering Detection AI Engine — How to prevent the next Software Supply Chain Attack
How AI assists in protecting your software development process to eliminate any chance of a software supply chain attack.
Yakir Ben-Aliz
May 23, 2023
3CX Software Supply Chain Breach — How can we prevent such attacks?
3CX Software Supply Chain Breach — How can we prevent such attacks?
It happened again. Another software supply chain attack distributing malware to many customers.
Yoad Fekete
May 1, 2023
SBOM is important, but don’t rely on it to prevent the next software supply chain attack
SBOM is important, but don’t rely on it to prevent the next software supply chain attack
Detecting MALICIOUS code in open-source packages is not that trivial.
Yoad Fekete
Feb 22, 2023
About BlindSpot Security
Latest Stories
Archive
About Medium
Terms
Privacy
Teams