How Shady Code Commits Compromise the Security of the Open-Source Ecosystem

Credit to Author: Trend Micro Research| Date: Mon, 11 Jul 2022 00:00:00 +0000

In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or backers. We also provide an analysis of what these incidents could mean for the IT industry and the open source community.

Read more

Private 5G Network Security Expectations Part 2

Credit to Author: Jun Morimoto| Date: Tue, 05 Jul 2022 00:00:00 +0000

The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks?

Read more

GraphQL vs gRPC: Which One Creates More Secure APIs?


Learn about the security capabilities of GraphQL and gRPC, how they perform authentication/authorization, and how they compare to REST. In addition, discover common attack vectors for both API frameworks and how to prevent them.

Read more

Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

Credit to Author: Magno Logan| Date: Thu, 07 Jul 2022 00:00:00 +0000

We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that malicious actors exploit for easy monetary gain.

Read more