Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychainsecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
GitHub Actions Security: How to Stop Secret Leaks in CI/CD
DevOps Start
DevOps Start
DevOps Start
Follow
Apr 20
GitHub Actions Security: How to Stop Secret Leaks in CI/CD
#
githubactionssecurity
#
oidcauthentication
#
cicdhardening
#
supplychainsecurity
Comments
Add Comment
7 min read
How Attackers Turned Trivy Into a Weapon Against Cisco
RC
RC
RC
Follow
Apr 20
How Attackers Turned Trivy Into a Weapon Against Cisco
#
supplychainsecurity
#
threatintelligence
#
shinyhunters
#
ciscobreach
Comments
Add Comment
4 min read
Cisco's Source Code Breach Was Structural, Not Accidental
RC
RC
RC
Follow
Apr 20
Cisco's Source Code Breach Was Structural, Not Accidental
#
cybersecurity
#
databreach
#
supplychainsecurity
#
secretsmanagement
Comments
Add Comment
3 min read
Governing Security in the Age of Infinite Signal – From Discovery to Control
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Apr 11
Governing Security in the Age of Infinite Signal – From Discovery to Control
#
applicationsecurity
#
devsecops
#
supplychainsecurity
#
vulnerabilityinsights
Comments
Add Comment
7 min read
Supply chain security for dependencies
binadit
binadit
binadit
Follow
Apr 7
Supply chain security for dependencies
#
supplychainsecurity
#
dependencymanagement
#
vulnerabilityscanning
#
npmsecurity
Comments
Add Comment
3 min read
Supermicro GPU Smuggling: What the Indictment Reveals
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 21
Supermicro GPU Smuggling: What the Indictment Reveals
#
semiconductorindustry
#
supplychainsecurity
#
exportcontrols
#
aihardware
Comments
Add Comment
7 min read
The Vulnerability Scanner That Became the Vulnerability
Peter Nasarah Dashe
Peter Nasarah Dashe
Peter Nasarah Dashe
Follow
Mar 31
The Vulnerability Scanner That Became the Vulnerability
#
cybersecurity
#
devsecops
#
opensource
#
supplychainsecurity
1
 reaction
Comments
2
 comments
2 min read
How to Detect and Recover From a Compromised Container Scanner
Alan West
Alan West
Alan West
Follow
Mar 23
How to Detect and Recover From a Compromised Container Scanner
#
security
#
containers
#
devops
#
supplychainsecurity
Comments
Add Comment
5 min read
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Apr 1
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
#
supplychainsecurity
1
 reaction
Comments
Add Comment
9 min read
Should RubyGems/Bundler Have a Cooldown Feature?
SHIBATA Hiroshi
SHIBATA Hiroshi
SHIBATA Hiroshi
Follow
Mar 19
Should RubyGems/Bundler Have a Cooldown Feature?
#
ruby
#
security
#
supplychainsecurity
#
packaging
58
 reactions
Comments
5
 comments
4 min read
18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.
nasuy
nasuy
nasuy
Follow
Mar 26
18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.
#
ai
#
security
#
mcp
#
supplychainsecurity
7
 reactions
Comments
Add Comment
3 min read
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 20
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
#
ai
#
vulnerabilityinsights
#
supplychainsecurity
#
opensourcesecurity
Comments
Add Comment
11 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Feb 17
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report
#
devsecops
#
cybersecurity
#
zerotrust
#
supplychainsecurity
Comments
Add Comment
3 min read
How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 11
How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware
#
ai
#
opensourcesecurity
#
securitylabs
#
supplychainsecurity
5
 reactions
Comments
Add Comment
6 min read
Exploitability Isn’t the Answer. Breakability Is.
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 13
Exploitability Isn’t the Answer. Breakability Is.
#
supplychainsecurity
#
vulnerabilityinsights
#
javascript
#
node
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account