Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Learn the types, tools, techniques, principles and more
Now we follow all best practices required by OpenSSF
Outstanding incidents of this type of crime since 2011
Introduction to a trend of just over a decade ago
An OffSec Exploitation Expert review
Towards an approach that engages more than SCA and SBOM
An interview with members of our hacking team