sbomx

112 posts

sbomx banner
sbomx

sbomx

@sbom_x

Software Bill of Materials · Software Supply Chain Security · License Check · Vulnerability Analysis

Darmstadt, Germany Katılım Nisan 2022
733 Takip Edilen62 Takipçiler
sbomx
sbomx@sbom_x·
@albertlacambra You will always have dependencies. You just have to keep an eye on them and use as little as possible
English
1
0
1
0
Albert Lacambra
Albert Lacambra@albertlacambra·
@sbom_x Just go back to java ee and snippets copy paste. Ist the simplest and more efficient and secure way to work 😉
English
1
0
0
0
sbomx
sbomx@sbom_x·
Introducing Open Source Insights data in BigQuery to help secure software supply chains @googlecloud cloud.google.com/blog/products/… "This dataset provides access to critical software supply chain information for developers, maintainers and consumers of open-source software."
English
0
0
0
0
sbomx
sbomx@sbom_x·
The 5×5—Reflections on trusting trust: Securing software supply chains atlanticcouncil.org/content-series… "It is like we built a digital Manhattan on a foundation of quicksand and swamps"
English
0
0
0
0
sbomx retweetledi
Brandon Lum
Brandon Lum@lumjjb·
The Cybersecurity Coalition group has published its SBOM position paper! Check it out here. It talks about factors such as gaps in the ability to distribute and automate consumption of SBOMs, and open questions around what does SBOM mean in the cloud? cybersecuritycoalition.org/reports/cybers…
English
0
2
4
0
sbomx
sbomx@sbom_x·
@lrvick We could go on for a long time ...
English
0
0
0
0
https://mastodon.social/@lrvick
1. Buy expired NPM maintainer email domains. 2. Re-create maintainer emails 3. Take over packages 4. Submit legitimate security patches that include package.json version bumps to malicious dependency you pushed 5. Enjoy world domination.
English
15
338
1.7K
0
sbomx retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
@snyksec Tnx for your excellent analysis at snyk.io/blog/npm-depen… and don't worry, the "malicious actor" is one of our interns 😎 who was tasked to research dependency confusion as part of our continuous attack simulations for clients. (1/2)
English
3
28
84
0