ContentPosts from @mashka..
Link
@mashka shared a link, 1ย year ago
Paid Acquisition and Growth Marketing, xygeni

Software Supply Chain Security 2024 Wrap-Up

๐‘๐ž๐ ๐ข๐ฌ๐ญ๐ž๐ซ ๐๐จ๐ฐ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐‹๐š๐ฌ๐ญ ๐’๐š๐Ÿ๐ž๐ƒ๐ž๐ฏ ๐“๐š๐ฅ๐ค ๐จ๐Ÿ ๐ญ๐ก๐ž ๐˜๐ž๐š๐ซ: ๐’๐จ๐Ÿ๐ญ๐ฐ๐š๐ซ๐ž ๐’๐ฎ๐ฉ๐ฉ๐ฅ๐ฒ ๐‚๐ก๐š๐ข๐ง ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ’ ๐–๐ซ๐š๐ฉ-๐”๐ฉ!
Join us for a special episode that reunites the expert speakers who started our year with insights on Software Supply Chain Security. Together, weโ€™ll review the key trends and lessons of 2024 and explore what lies ahead for 2025.

Software Supply Chain Security 2024 Wrap Up
Link
@mashka shared a link, 1ย year ago
Paid Acquisition and Growth Marketing, xygeni

Advanced Software Composition Analysis: A Modern Guide to Open Source Security

We are thrilled to share our latest eBook that provides expert guidance on implementing effective Software Composition Analysis (SCA) to tackle vulnerabilities, ensure compliance, and protect against emerging threats in your open-source dependencies!

Advanced Software Composition Analysis: A Modern Guide to Open Source Security
Link
@mashka shared a link, 1ย year, 1ย month ago
Paid Acquisition and Growth Marketing, xygeni

XZ Backdoor: โ€œThat was a close oneโ€

In this blog post, Xygeni discusses about the backdoor discovery in the xz compression utilityโ€™s liblzma library. The backdoor, targeting SSH servers, was introduced through obfuscated code modifications and affected certain Linux environments. It used advanced obfuscation techniques to hide in pre-release versions, activating under specific conditions to enable remote command execution. Read all about it!

Warning-xz-backdoor
ย Activity
@mashka added a new tool Xygeni Security , 1ย year, 2ย months ago.
Link Xygeni Team
@mashka shared a link, 1ย year, 2ย months ago
Paid Acquisition and Growth Marketing, xygeni

Beyond Conventional SCA (Software Composition Analysis)

๐‘๐ž๐ ๐ข๐ฌ๐ญ๐ž๐ซ ๐๐จ๐ฐ to our next episode of SafeDev Talks and ๐ญ๐ฎ๐ซ๐ง ๐’๐‚๐€ ๐œ๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ ๐ข๐ง๐ญ๐จ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฐ๐ข๐ง๐ฌ! Donโ€™t miss this opportunity to learn from top experts how to overcome false positives, boost visibility, prioritize real risks, and automate remediation, transforming SCA pain points into actionable security gains.

SafeDev-Talk-Software-Composition-Analysis
Link Xygeni Team
@mashka shared a link, 1ย year, 6ย months ago
Paid Acquisition and Growth Marketing, xygeni

NPM flooding case-study: โ€œDown the Rabbit Hole looking for a Teaโ€

While the presence of malicious code in package registries is well-known, there are other strange or unusual behaviors that completely go unnoticed by the regular users of these registries. Even for those of us who keep a close watch on them, it is not easy to find a reason or explanation for such behavior. Read about it!

NPM_Flooding
ย Activity
@mashka created an organization Xygeni , 1ย year, 6ย months ago.