#softwaresecurity 搜尋結果

We’re excited to welcome Aleksandr Kolchanov, Independent Researcher, as he explores how attackers compromise web installers to inject malicious code and evade controls. #CyberSecurity #SoftwareSecurity #Infosec #Malware #ThreatIntel

_c0c0n_'s tweet image. We’re excited to welcome Aleksandr Kolchanov, Independent Researcher, as he explores how attackers compromise web installers to inject malicious code and evade controls.

#CyberSecurity #SoftwareSecurity #Infosec #Malware #ThreatIntel

🛡️ 𝐆𝐞𝐭 𝐓𝐡𝐞 𝐃𝐨𝐃 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 𝐂𝐡𝐚𝐫𝐭 𝐓𝐨𝐝𝐚𝐲! The chart features over 200+ polices and is updated regularly to bring you the most current information. Click here: buff.ly/3LOEyMa. #cybersecurity #softwaresecurity #datasecurity


Embracing the idea that we can share evidence (a key fragment was used) without ever having to share the key fragment. Digging into ineffable crypto chat with Mike Loewy from TideCloak #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


When you need to understand what's in your embedded software, a file-based SBOM that doesn't require a package manager is the way to go. runsafe.ly/3KnUUxD #SBOM #SoftwareSecurity #EmbeddedSoftware #AppSec

RunSafeSecurity's tweet image. When you need to understand what's in your embedded software, a file-based SBOM that doesn't require a package manager is the way to go.

runsafe.ly/3KnUUxD

#SBOM #SoftwareSecurity #EmbeddedSoftware #AppSec

It's official! AgileConnection is now StickyMinds! Follow @StickyMinds for the latest on #agile #DevOps #softwaresecurity #softwaretesting and much more!

agileconn's tweet image. It's official! AgileConnection is now StickyMinds! Follow @StickyMinds for the latest on #agile #DevOps #softwaresecurity #softwaretesting and much more!

Curious about what an #SBOM is? 🤔 It's not something you buy, but a critical tool for software security! Learn how it tracks your software components & keeps your development safe. 🔍 #SoftwareSecurity


Super smart! TideClock co-founder Mike Loewy on the academic principles behind why ineffable cryptography works. #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


Your customers demand proof they can trust your software. Join #security experts from JFrog & @SonarSource to learn how #SDLC evidence ensures software integrity. 📆 Thursday, October 23rd at 10am PT 🔗 Register now: bit.ly/4n0UPxf #SoftwareSecurity #TrustVerified

jfrog's tweet image. Your customers demand proof they can trust your software. Join #security experts from JFrog & @SonarSource to learn how #SDLC evidence ensures software integrity. 

📆 Thursday, October 23rd at 10am PT
🔗 Register now: bit.ly/4n0UPxf 

#SoftwareSecurity #TrustVerified

Reet Kaur, author of 97 Things Every Application Security Professional Should Know, will be presenting. It is a great chance to get insights & a signed copy! Grab the book 👉 ow.ly/wIYB50WTl78 Register 👉 ow.ly/xnBm50WTl79 #AppSec #CyberSecurity #SoftwareSecurity

PNSQC's tweet image. Reet Kaur, author of 97 Things Every Application Security Professional Should Know, will be presenting. It is a great chance to get insights & a signed copy! 
Grab the book 👉 ow.ly/wIYB50WTl78
Register 👉 ow.ly/xnBm50WTl79

#AppSec #CyberSecurity #SoftwareSecurity

Updates are critical to keeping your software secure. Never ignore update notifications - they protect you from new threats. #SoftwareSecurity #UpdateNow #StaySafe #doitcraj

DoITCRaj's tweet image. Updates are critical to keeping your software secure. Never ignore update notifications - they protect you from new threats.
#SoftwareSecurity #UpdateNow #StaySafe #doitcraj

⚠️A concerning supply chain security issue has emerged within the ‘s1ngularity’ AI ecosystem. Malicious NX packages are being distributed, injecting cryptocurrency miners and potentially exfiltrating sensitive data. #SupplyChainSecurity #SoftwareSecurity thehackernews.com/2025/08/malici…


Market forces have sidelined #softwaresecurity, leaving software vulnerable. Industry needs to develop a standard for creating software that is secure by design, says a paper from @AFCEA International and coauthored by the SEI’s Greg Touhill - insights.sei.cmu.edu/news/new-paper…

SEI_CMU's tweet image. Market forces have sidelined #softwaresecurity, leaving software vulnerable. Industry needs to develop a standard for creating software that is secure by design, says a paper from @AFCEA International and coauthored by the SEI’s Greg Touhill - insights.sei.cmu.edu/news/new-paper…

You can't secure what you can't see. Use Software Bill Of Materials (SBOM) and verify code integrity. Know your software, protect your systems. #SBOM #SoftwareSecurity #SupplyChainSecurity

renu_cert's tweet image. You can't secure what you can't see. Use Software Bill Of Materials (SBOM) and verify code integrity. Know your software, protect your systems.
#SBOM #SoftwareSecurity #SupplyChainSecurity

Introducing JFrog AppTrust. Security, governance, and visibility in every release. Trusted applications start here → bit.ly/42Qqb2e #SoftwareSecurity #DevSecOps

jfrog's tweet image. Introducing JFrog AppTrust. Security, governance, and visibility in every release.

Trusted applications start here → bit.ly/42Qqb2e

#SoftwareSecurity #DevSecOps

The Code & Commit stage is crucial for secure software development. It focuses on preventing vulnerabilities via secure coding, Git hooks, and secret management for robust CI/CD integration. 🛡️💻 #SecureDevelopment #SoftwareSecurity link: ift.tt/ENaoQZq

TweetThreatNews's tweet image. The Code & Commit stage is crucial for secure software development. It focuses on preventing vulnerabilities via secure coding, Git hooks, and secret management for robust CI/CD integration. 🛡️💻 #SecureDevelopment #SoftwareSecurity

link: ift.tt/ENaoQZq

Security isn't just about shifting left. @Adobe experts show how shift-left and shift-right strategies can work together—not compete—to strengthen your security approach. ▶️ Full video here: buff.ly/SY0oms6 #DevSecOps #CyberSecurity #SoftwareSecurity #AdobeSecurity


Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names dlvr.it/TNKT1N #Cybersecurity #VSCODE #SoftwareSecurity #Malware #CyberThreats

blueteamsec1's tweet image. Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names dlvr.it/TNKT1N #Cybersecurity #VSCODE #SoftwareSecurity #Malware #CyberThreats

If your team dreads dependency upgrades, chases false positives, and struggles to prioritize vulns that matter... This report from @EndorLabs might help. We at @AppSec_Village ❤️ tools that bring clarity. endorlabs.com/lp/dependency-… #AppSec #OpenSource #SoftwareSecurity

AppSec_Village's tweet image. If your team dreads dependency upgrades,
chases false positives,
and struggles to prioritize vulns that matter... 
This report from @EndorLabs might help.

We at @AppSec_Village ❤️ tools that bring clarity.  
endorlabs.com/lp/dependency-… 

 #AppSec #OpenSource #SoftwareSecurity

Federico Fregosi shares how to secure your supply chain without slowing down at Heapcon 2025. Watch the video to get a glimpse of his talk & join us in Belgrade, Oct 30-31! 🎟 heapcon.io/2025/tickets #Heapcon2025 #SoftwareSecurity #SupplyChainSecurity


🛡️ 𝐆𝐞𝐭 𝐓𝐡𝐞 𝐃𝐨𝐃 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 𝐂𝐡𝐚𝐫𝐭 𝐓𝐨𝐝𝐚𝐲! The chart features over 200+ polices and is updated regularly to bring you the most current information. Click here: buff.ly/3LOEyMa. #cybersecurity #softwaresecurity #datasecurity


Embracing the idea that we can share evidence (a key fragment was used) without ever having to share the key fragment. Digging into ineffable crypto chat with Mike Loewy from TideCloak #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


🔒 Secure Software Coding: Best Practices for Protecting Your Applications Enroll now! tinyurl.com/2s3d93p Click to Join WhatsApp shorturl.at/Uqswx 🎞️ Subscribe YouTube bit.ly/31R9zZt #SecureCoding #SoftwareSecurity #Cybersecurity #Omni_academy

Omniacademypk's tweet image. 🔒 Secure Software Coding: Best Practices for Protecting Your Applications 
Enroll now! tinyurl.com/2s3d93p
Click to Join WhatsApp shorturl.at/Uqswx
🎞️ Subscribe YouTube bit.ly/31R9zZt
#SecureCoding #SoftwareSecurity #Cybersecurity #Omni_academy

Turn your indie projects into trusted software. Sign your code, show your identity, and make every download safe and professional. Product Link - tinyurl.com/comodo-individ… #CodeSigning #comodo #SoftwareSecurity #indiedevs #indiedeveloper

Sign_My_Code's tweet image. Turn your indie projects into trusted software. Sign your code, show your identity, and make every download safe and professional.

Product Link - tinyurl.com/comodo-individ…

#CodeSigning #comodo #SoftwareSecurity #indiedevs #indiedeveloper

The GlassWorm campaign targeting Open VSX infected VS Code extensions with malware stealing data and crypto. Malicious extensions removed, tokens revoked, and automated scans enhanced security. #GlassWorm #OpenVSX #SoftwareSecurity ift.tt/ljcLFKA


Catch up on Emproof insights on YouTube 🎥 Webinars, recaps & the latest in code protection and embedded security. 👉 youtube.com/channel/UC8zEy… #CyberSecurity #SoftwareSecurity #ReverseEngineering #AppSec #EmbeddedSecurit


Think your software is safe? Uncover hidden malware and security threats that target your software; learn how code signing can secure your software. Read it here - tinyurl.com/software-secur… #SoftwareSecurity #malwareprotection #malware #appsecurity


Super smart! TideClock co-founder Mike Loewy on the academic principles behind why ineffable cryptography works. #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


🥳 We are thrilled to announce the 4th edition of MSR4P&S! Are you working at the intersection of #MSR and #softwaresecurity ? Then this #workshop is for YOU!🫵 Submit your paper and meet us in Limassol at @SANERconf 🇨🇾 🌎 Check out our website: msr4ps.github.io

MSR4PSworkshop's tweet image. 🥳 We are thrilled to announce the 4th edition of MSR4P&S! 
Are you working at the intersection of #MSR and #softwaresecurity ? Then this #workshop is for YOU!🫵
Submit your paper and meet us in Limassol at @SANERconf 🇨🇾
🌎 Check out our website: msr4ps.github.io

🛡️ Protect What Matters Most! Boost your organization’s defense with cybersecurity best practices for software and applications. Learn more: zurl.co/vKb88 #Cybersecurity #SoftwareSecurity #DataProtection #BusinessSafety #TechProtection

VoDaViTech's tweet image. 🛡️ Protect What Matters Most! Boost your organization’s defense with cybersecurity best practices for software and applications. Learn more: zurl.co/vKb88

#Cybersecurity #SoftwareSecurity #DataProtection #BusinessSafety #TechProtection

We’re excited to welcome Aleksandr Kolchanov, Independent Researcher, as he explores how attackers compromise web installers to inject malicious code and evade controls. #CyberSecurity #SoftwareSecurity #Infosec #Malware #ThreatIntel

_c0c0n_'s tweet image. We’re excited to welcome Aleksandr Kolchanov, Independent Researcher, as he explores how attackers compromise web installers to inject malicious code and evade controls.

#CyberSecurity #SoftwareSecurity #Infosec #Malware #ThreatIntel

It's official! AgileConnection is now StickyMinds! Follow @StickyMinds for the latest on #agile #DevOps #softwaresecurity #softwaretesting and much more!

agileconn's tweet image. It's official! AgileConnection is now StickyMinds! Follow @StickyMinds for the latest on #agile #DevOps #softwaresecurity #softwaretesting and much more!

Updates are critical to keeping your software secure. Never ignore update notifications - they protect you from new threats. #SoftwareSecurity #UpdateNow #StaySafe #doitcraj

DoITCRaj's tweet image. Updates are critical to keeping your software secure. Never ignore update notifications - they protect you from new threats.
#SoftwareSecurity #UpdateNow #StaySafe #doitcraj

Stay updated! Enable automatic software updates to protect against cyber threats. Keep your devices secure. 🛡️#SoftwareSecurity #CyberSafetyTips #DigitalIndia

_DigitalIndia's tweet image. Stay updated! Enable automatic software updates to protect against cyber threats. Keep your devices secure. 🛡️#SoftwareSecurity #CyberSafetyTips #DigitalIndia

Reet Kaur, author of 97 Things Every Application Security Professional Should Know, will be presenting. It is a great chance to get insights & a signed copy! Grab the book 👉 ow.ly/wIYB50WTl78 Register 👉 ow.ly/xnBm50WTl79 #AppSec #CyberSecurity #SoftwareSecurity

PNSQC's tweet image. Reet Kaur, author of 97 Things Every Application Security Professional Should Know, will be presenting. It is a great chance to get insights & a signed copy! 
Grab the book 👉 ow.ly/wIYB50WTl78
Register 👉 ow.ly/xnBm50WTl79

#AppSec #CyberSecurity #SoftwareSecurity

Stay updated! Enable automatic software updates to protect against cyber threats. Keep your devices secure. 🛡️#SoftwareSecurity #CyberSafetyTips #DigitalIndia

NeGD_GoI's tweet image. Stay updated! Enable automatic software updates to protect against cyber threats. Keep your devices secure. 🛡️#SoftwareSecurity #CyberSafetyTips #DigitalIndia

🚀 The Fuzzing Educational Course is now publicly available! This comprehensive course covers techniques and tools for fuzzing in various languages such as Python, Go, Rust, Java, and Web. github.com/raminfp/the-ar… #Fuzzing #SoftwareSecurity #Education

realraminfp's tweet image. 🚀 The Fuzzing Educational Course is now publicly available! This comprehensive course covers techniques and tools for fuzzing in various languages such as Python, Go, Rust, Java, and Web.
github.com/raminfp/the-ar…

#Fuzzing #SoftwareSecurity #Education

You can't secure what you can't see. Use Software Bill Of Materials (SBOM) and verify code integrity. Know your software, protect your systems. #SBOM #SoftwareSecurity #SupplyChainSecurity

renu_cert's tweet image. You can't secure what you can't see. Use Software Bill Of Materials (SBOM) and verify code integrity. Know your software, protect your systems.
#SBOM #SoftwareSecurity #SupplyChainSecurity

Introducing JFrog AppTrust. Security, governance, and visibility in every release. Trusted applications start here → bit.ly/42Qqb2e #SoftwareSecurity #DevSecOps

jfrog's tweet image. Introducing JFrog AppTrust. Security, governance, and visibility in every release.

Trusted applications start here → bit.ly/42Qqb2e

#SoftwareSecurity #DevSecOps

North Korean hackers uploaded new malicious Python packages to the Package Index (PyPI) repository as part of an ongoing software supply chain campaign called VMConnect. @ReversingLabs @pypi @TheHackersNews #cybersecurity #softwaresecurity #hacker #northkorea

Cyber_Asia_'s tweet image. North Korean hackers uploaded new malicious Python packages to the Package Index (PyPI) repository as part of an ongoing software supply chain campaign called VMConnect.

@ReversingLabs @pypi @TheHackersNews

#cybersecurity #softwaresecurity #hacker #northkorea

#EclipseFdn head of security @mikbarbero discusses the findings from our new survey report software supply chain security practices in his new blog: hubs.la/Q01H3t4L0 #SoftwareSecurity #SLSA #opensource #softwaresupplychain

EclipseFdn's tweet image. #EclipseFdn head of security @mikbarbero discusses the findings from our new survey report software supply chain security practices in his new blog: hubs.la/Q01H3t4L0 #SoftwareSecurity #SLSA #opensource #softwaresupplychain

This recent blog post of ours delves into the principles of DevSecOps and the importance of shifting security left and making it an integral part of the entire development process: blog.codacy.com/what-is-devsec… #devsecops #softwaresecurity #codesecurity #shiftleft

codacy's tweet image. This recent blog post of ours delves into the principles of DevSecOps and the importance of shifting security left and making it an integral part of the entire development process:

blog.codacy.com/what-is-devsec…

#devsecops #softwaresecurity #codesecurity #shiftleft

Market forces have sidelined #softwaresecurity, leaving software vulnerable. Industry needs to develop a standard for creating software that is secure by design, says a paper from @AFCEA International and coauthored by the SEI’s Greg Touhill - insights.sei.cmu.edu/news/new-paper…

SEI_CMU's tweet image. Market forces have sidelined #softwaresecurity, leaving software vulnerable. Industry needs to develop a standard for creating software that is secure by design, says a paper from @AFCEA International and coauthored by the SEI’s Greg Touhill - insights.sei.cmu.edu/news/new-paper…

Looking for insights into software supply chain security practices? Our new whitepaper, co-authored with @Chainguard_dev, @TheOpenSSF, and @rust_foundation, has you covered. Read it here: hubs.la/Q01H8gqd0 #softwaresecurity #supplychainmanagement

EclipseFdn's tweet image. Looking for insights into software supply chain security practices? Our new whitepaper, co-authored with @Chainguard_dev, @TheOpenSSF, and @rust_foundation, has you covered. Read it here: hubs.la/Q01H8gqd0 #softwaresecurity #supplychainmanagement

Your customers demand proof they can trust your software. Join #security experts from JFrog & @SonarSource to learn how #SDLC evidence ensures software integrity. 📆 Thursday, October 23rd at 10am PT 🔗 Register now: bit.ly/4n0UPxf #SoftwareSecurity #TrustVerified

jfrog's tweet image. Your customers demand proof they can trust your software. Join #security experts from JFrog & @SonarSource to learn how #SDLC evidence ensures software integrity. 

📆 Thursday, October 23rd at 10am PT
🔗 Register now: bit.ly/4n0UPxf 

#SoftwareSecurity #TrustVerified

Our CEO @jaimefjorge is participating in a great virtual event hosted by @TheLeadDev on February 14: "Balancing innovation and security in software development." Register today so you don't miss it! tinyurl.com/3c6xbdfu #softwaredevelopment #softwaresecurity #codequality

codacy's tweet image. Our CEO @jaimefjorge is participating in a great virtual event hosted by @TheLeadDev on February 14: "Balancing innovation and security in software development."

Register today so you don't miss it!

tinyurl.com/3c6xbdfu

#softwaredevelopment #softwaresecurity #codequality

92% of UK IT leaders are deeply worried about email security, especially phishing attacks. 🔒 Our research shows that security credentials are crucial for brand trust in the software industry. 🌐 👉 bit.ly/3Fwu54w #ITLeaders #SoftwareSecurity

Exclaimer's tweet image. 92% of UK IT leaders are deeply worried about email security, especially phishing attacks. 🔒

Our research shows that security credentials are crucial for brand trust in the software industry. 🌐

👉 bit.ly/3Fwu54w

#ITLeaders #SoftwareSecurity

Just in 📩 92% of UK IT leaders are deeply worried about email security, especially phishing attacks. 🔒 Our research shows that security credentials are crucial for brand trust in the software industry. 🌐 👉 bit.ly/3Fwu54w #ITLeaders #SoftwareSecurity

Exclaimer's tweet image. Just in 📩 

92% of UK IT leaders are deeply worried about email security, especially phishing attacks. 🔒

Our research shows that security credentials are crucial for brand trust in the software industry. 🌐

👉 bit.ly/3Fwu54w

#ITLeaders #SoftwareSecurity

Loading...

Something went wrong.


Something went wrong.


United States Trends