5 critical lessons from the latest GitHub phishing campaign by Gitloker |
Nir Valtman |
Jun 17, 2024 |
1389 |
- |
[April fools] Introducing SecuriSlow™: Slowing Down Your Developers, Fast |
Nir Valtman |
Apr 01, 2024 |
274 |
- |
Malicious Code Campaign on GitHub Repos: Is it Hype or a Dire Threat? |
Nir Valtman |
Mar 05, 2024 |
754 |
2 |
What Every Developer Needs to Know About GitHub Branch Protection |
Nir Valtman |
Mar 13, 2024 |
1430 |
1 |
The Essential Guide to SCA and SAST |
Simon Wenet |
Feb 08, 2024 |
505 |
- |
Leveraging EPSS, CVSS, and KEV for Comprehensive Risk Management & Prioritization |
Simon Wenet |
Feb 20, 2024 |
1040 |
- |
Minimize AppSec Effort and Maximize AppSec Coverage with Pipelineless Security Scanning |
Nir Valtman |
Jan 23, 2024 |
1972 |
- |
Practical Guide for Evaluating Secret Detection Solutions to Fit Modern Software Development |
Nir Valtman |
Jun 12, 2024 |
2043 |
- |
Need for AppSec exposed by the ‘ResumeLooters’ SQL Injection & XSS Attacks |
Nir Valtman |
Feb 13, 2024 |
555 |
- |
New York Times Data Breach Reveals Secrets & Source Code |
Simon Wenet |
Jul 10, 2024 |
832 |
- |
Rabbit r1 Data Breach Again Shows The Dire Need for Improved Secrets Security |
Simon Wenet |
Jun 28, 2024 |
853 |
- |
Building an AppSec Program, Powered by Pipelineless Security |
Nir Valtman |
Aug 20, 2024 |
2644 |
- |
Time for an Honest Talk About Third-Party Risk Management and Software Composition Analysis (SCA) |
Mark Maney |
Sep 10, 2024 |
903 |
- |
Optimizing Code Security: Advanced Strategies in SAST Scanning |
Simon Wenet |
Sep 17, 2024 |
2199 |
- |
Implementing SAST Security Policies: Effective Strategies for Application Protection |
Eitam Arad |
Oct 10, 2024 |
2083 |
- |
State of Developer Time Loss 2024: How Arnica’s Pipelineless Security Can Help |
Eitam Arad |
Nov 05, 2024 |
1748 |
- |
Best Practices for SCA Scanning in Agile Development |
Eitam Arad |
Nov 14, 2024 |
2326 |
- |
How Arnica's Low-Reputation Package Detection Could Have Prevented the XML-RPC npm Package Breach |
Eran Medan |
Dec 02, 2024 |
869 |
- |
SAST vs. DAST: A Comparative Analysis |
Simon Wenet |
Jan 07, 2025 |
1158 |
- |
Launching Opengrep in response to Semgrep's Open Source Licensing Change |
Eran Medan |
Jan 23, 2025 |
563 |
- |
Evaluating SCA Tools for Addressing Open Source Vulnerabilities |
Anna Daugherty |
Feb 13, 2025 |
2520 |
- |
Prioritizing AppSec Vulnerabilities: Developer Context vs. Full Reachability |
Nir Valtman |
Feb 11, 2025 |
524 |
- |
Direct vs. Transitive Dependencies: Navigating Package Management in Software Composition Analysis (SCA) |
Anna Daugherty |
Feb 25, 2025 |
2908 |
- |
GitHub Actions Supply Chain Attack: What Arnica Customers Need to Know |
Eran Medan |
Mar 17, 2025 |
677 |
- |