CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Open Source
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Open Source

Developer working on sofa showing software supply chain attacks on open source
Cyber SecurityInsights

Sophisticated Attackers Are Increasing in the Software Supply Chain

October 25, 2023
The software supply chain is becoming the new battleground. Trust, once a cornerstone of open-source, is now under scrutiny. Developers need to exercise caution, vetting each package, no matter how reputable the source might seem.
Read More
Binary code on monitor showing software supply chain attacks and open source
Cyber SecurityNews

Open Source Software Supply Chain Attacks Have Tripled, But Nearly All Vulnerabilities Are Avoidable by Updating

October 17, 2023
Software supply chain attacks have spiked significantly year-over-year. Sonatype logged over 245,032 malicious packages in open source projects available to public download in 2023, double the number seen from 2019 to 2022. In total, one in eight open source downloads poses a risk.
Read More
Phone and headset on desk showing supply chain attack on 3CX VoIP software
Cyber SecurityNews

Supply Chain Attack on VoIP Firm 3CX Puts 600,000 Businesses at Risk, Including Fortune 500 Companies

April 11, 2023
A very commonly used VoIP telephony system has been compromised via trojans snuck in through an open source component, and the supply chain attack puts over half a million global businesses at risk.
Read More
Programmer writing code on laptop showing open source software security
Cyber SecurityNews

Bipartisan Open Source Software Security Bill Proposed in Response to Log4j Issues

October 5, 2022
The fallout from the Log4j vulnerability has prompted bipartisan action to beef up open source software security. Proposed act would task CISA with developing a risk framework to evaluate open source code used by the federal government, and could be passed on to critical infrastructure businesses.
Read More
Logo of Twitter on smartphone screen with dollar bills and Elon Musk showing plan to open source Twitter's algorithm
Cyber SecurityNews

Elon Musk Plans To Take Twitter’s Algorithm Open Source; Could It Create Security Issues?

May 10, 2022
Some security experts worry that open source Twitter code would thus not be tremendously helpful in revealing how the system selects content, but would create avenues of attack for threat actors that could now scrutinize its internal workings.
Read More
Hands of open source developer in act of hacktivism
Cyber SecurityNews

In Act of Hacktivism, Open Source Project Maintainer Uses Code to Wipe Russian and Belarusian Computers

March 25, 2022
An open source project maintainer decided to protest the war in Ukraine by targeting computers with an IP address in Russia or Belarus with a malicious update in a controversial act of hacktivism.
Read More
Programmer working on laptop showing open source developer corrupting NPM libraries
Cyber SecurityNews

Open Source Developer Intentionally Corrupts NPM Libraries; Suspected Hack Turns Out to be Mischief

January 13, 2022
Thousands of companies using popular NPM libraries have just learned that the hidden price of free software is that the open source developer may withdraw their consent at any time.
Read More
Developer pointing finger at screen with code showing need for open source for trust and security
Cyber SecurityInsights

How Open Source Can Help Build a New Era of Trust and Security

September 23, 2020
To meet the ever-increasing challenge of cybercrime and rebuild user trust, tech companies will need to be built with a new standard that embraces a transparent and open source approach.
Read More
Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
Read More

Latest

Criminal talking on the phone showing vishing attacks

Google Warns Salesforce Customers of Large-Scale Vishing Attacks

Google logo showing certificate authorities

Google to Distrust Two Certificate Authorities Over Compliance Issues

Hands typing on keyboard showing security incident

Victoria’s Secret Security Incident Shuts Down Lingerie Giant’s Systems

Cars waiting on the road showing vehicle security

Balancing Safety and Security in Software-Defined Vehicles

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results