Log4Shell, a critical vulnerability discovered in December 2021 and officially tracked as CVE-2021-44228, has had a long-lasting impact, prompting enterprises to adopt software composition analysis and secure supply chain management practices. Despite receiving patches and widespread attention, it remains a common cause for security breaches a year later. https://www.csoonline.com/article/3684108/log4shell-remains-a-big-threat-and-a-common-cause-for-security-breaches.html#tk.rss_all #Log4Shell #CVE2021-44228 #SoftwareCompositionAnalysis #SecureSupplyChainManagement
#log4shell #cve2021 #softwarecompositionanalysis #securesupplychainmanagement
"Invisible npm malware β evading security checks with crafted versions" by Or Peles, JFrog Vulnerability Research Team Leader
https://jfrog.com/blog/invisible-npm-malware-evading-security-checks-with-crafted-versions/
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking
"nvisible npm malware β evading security checks with crafted versions" by Or Peles, JFrog Vulnerability Research Team Leader
https://jfrog.com/blog/invisible-npm-malware-evading-security-checks-with-crafted-versions/
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking
https://jfrog.com/blog/invisible-npm-malware-evading-security-checks-with-crafted-versions/
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking
#npm #appsec #applicationsecurity #security #cybersecurity #sca #softwarecompositionanalysis #malware #evasion #jfrog #dependencies #infosec #hacking