Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Learn the types, tools, techniques, principles and more
Now we follow all best practices required by OpenSSF
Among exposed were secrets, code and AI training data
Towards an approach that engages more than SCA and SBOM
What is invisible to some hackers is visible to others
Toyota's ancient and recently disclosed data leaks
Benefits and risks of these increasingly used programs