Recommended blog posts
You might be interested in the following related posts.
Threat landscape and cybersecurity trends we anticipate
Beware of insecure-by-default libraries!
Impacts of false positives by security software
Top cyberattack and prevention trends this year
Learn the types, tools, techniques, principles and more
Now we follow all best practices required by OpenSSF
Outstanding incidents of this type of crime since 2011
Introduction to a trend of just over a decade ago