Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Impacts of false positives by security software
Learn the types, tools, techniques, principles and more
Now we follow all best practices required by OpenSSF
Outstanding incidents of this type of crime since 2011
Introduction to a trend of just over a decade ago
Towards an approach that engages more than SCA and SBOM
What is invisible to some hackers is visible to others