News

Threat actors are continuously evolving their tactics to exploit vulnerabilities and gain unauthorized access. That increasingly involves attacks targeting the software supply chain. The post The ...
How Continuous Attestation Protects Banks from the Next SolarWinds An operations team monitors a financial data center’s ...
A "trust-based approach" can ensure a resilient supply chain that is adaptable to today’s—and tomorrow's—challenges.
Hallucinated package names fuel 'slopsquatting' The rise of AI-powered code generation tools is reshaping how developers ...
CISOs are on the look out for novel attack vectors or future breaches of the upstream assets partners use to deliver their ...
A new class of supply chain attacks named 'slopsquatting' has emerged from the increased use of generative AI tools for ...
A new report out today from software supply chain company JFrog Ltd. warns that an expansion of artificial intelligence ...
Supply chain security emerges as perhaps the most significant vulnerability in CMMC 2.0 readiness. While 66% of organizations report having advanced controls for third-party CUI access, 29% ...
The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardizing Trust in Newly Created ...
KubeCon + CloudNativeCon EU - Kusari, a software supply chain security startup, today announced the introduction of a new book, Securing the Software Supply Chain, and the company's participation in ...
SUNNYVALE, Calif. & LONDON--(BUSINESS WIRE)--(KubeCon + CloudNativeCon Europe) — JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform ...