Using Binary Analysis to Hunt Down OSS Vulnerabilities
Having an SBOM and software inventory aids in identifying 3rd-party vulnerabilities and risk
Top three tips for ensuring software supply chain security
At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache ...
SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity
The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE)...
TCP/IP stacks vulnerabilities are a wake-up call for embedded software
URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...