Source |
Veracode |
Identifiant |
8634160 |
Date de publication |
2025-01-06 10:38:18 (vue: 2025-01-06 16:07:29) |
Titre |
Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis |
Texte |
The rise of emerging open-source threats presents a growing risk to organizations as attackers increasingly exploit vulnerabilities in widely used libraries, frameworks, and tools. In fact, most Software Composition Analysis (SCA) tools on the market today are unable to keep up with the volume of new overtly malicious activities in the open-source ecosystem.
To address the critical threat, I\'m excited to announce Veracode\'s acquisition of Phylum Inc.\'s technology to advance our capabilities in securing software supply chains. The addition of Phylum will help the market\'s ability to combat threats through the advanced detection and mitigation of malicious packages in open-source libraries.
The dependencies of software teams on open-source libraries and the threats targeting these libraries make detecting and blocking malicious packages more critical than ever. Malicious packages often contain code designed to extract sensitive information such as credentials, API…
The rise of emerging open-source threats presents a growing risk to organizations as attackers increasingly exploit vulnerabilities in widely used libraries, frameworks, and tools. In fact, most Software Composition Analysis (SCA) tools on the market today are unable to keep up with the volume of new overtly malicious activities in the open-source ecosystem.
To address the critical threat, I\'m excited to announce Veracode\'s acquisition of Phylum Inc.\'s technology to advance our capabilities in securing software supply chains. The addition of Phylum will help the market\'s ability to combat threats through the advanced detection and mitigation of malicious packages in open-source libraries.
The dependencies of software teams on open-source libraries and the threats targeting these libraries make detecting and blocking malicious packages more critical than ever. Malicious packages often contain code designed to extract sensitive information such as credentials, API… |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
ability acquires acquisition activities addition address advance advanced analysis announce api… are attackers blocking capabilities chains chains: code combat composition contain credentials critical dependencies designed detecting detection ecosystem emerging enhanced ever excited exploit extract fact frameworks growing help inc increasingly information innovating keep libraries make malicious market mitigation more most new often open organizations overtly packages phylum presents rise risk sca secure securing sensitive software source such supply targeting teams technology than these threat threats through today tools unable used veracode volume vulnerabilities widely will |
Tags |
Tool
Vulnerability
Threat
|
Stories |
|
Move |
|