Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Unknown risks in the software supply chain: A closer look
    Cyber Security

    Unknown risks in the software supply chain: A closer look

    techempireBy techempire1 Comment3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 24, 2024Hacker NewsVulnerabilities/Software Security

    Software supply chain

    In a world where more and more organizations are adopting open source components as fundamental blocks in their application infrastructure, it is difficult to view traditional SCA as a complete protection mechanism against open source threats.

    Using open source libraries saves a lot of coding and debugging time, thus shortening the time it takes to deliver your application. But as code bases increasingly consist of open source software, it’s time to respect the entire attack surface when choosing attack options, including attacks on the supply chain itself. SCA platform rely.

    a dependency effect

    When companies add open source libraries, they may not only add the library they want, but many others. This is due to the way open source libraries are built: like every other application on the planet, they target delivery and development speed, and therefore rely on code built by others – i.e. other open source libraries.

    The actual terms are direct dependencies (which are packages that are added to the application) and transitive dependencies (which are packages that are added implicitly by dependencies).If your application uses package A, and package A uses package B, then your application indirectly rely on On package B.

    If Suite B is vulnerable, then your project is also vulnerable. This problem gave rise to the field of SCA (Software Composition Analysis), which can help detect vulnerabilities and recommend fixes.

    However, SCA can only address vulnerability issues. What about supply chain attacks?

    Supply Chain Security Best Practices Cheat Sheet

    Software supply chain attacks are on the rise.

    According to Gartner forecast, by 2025, 45% of organizations will be affected. Traditional software composition analysis (SCA) tools are not enough, now is the time to take action.

    Download our cheat sheet to spot five types of critical supply chain attacks and better understand the risks. Defend against them by implementing the 14 best practices listed at the end of the cheat sheet.

    🔗 Download the cheat sheet now

    Attack VS.loopholes

    It may not be obvious what we mean “Unknown” risks. Before we dive into the differences, let’s consider the difference between a vulnerability and an attack:

    A loophole:

    • Unintentional errors (except for very specific complex attacks)
    • Identified by CVE
    • Recorded in a public repository
    • Can defend before exploiting
    • Includes regular vulnerabilities and zero-day vulnerabilities
      • Example: Log4Shell is a vulnerability

    Supply chain attacks:

    • deliberate malicious activity
    • Lack of specific CVE identification
    • Not subject to standard SCA and public DB tracking
    • Usually an attempt has been made to preset being exploited or activated.
      • Example: SolarWinds is a supply chain attack

    Almost by definition, unknown risks are: an attack Located in the supply chain that is not easily detected by the SCA platform.

    SCA tools are not enough!

    SCA tools may seem like they solve the problem of protecting you from supply chain risks, but they fail to solve any unknown risks (including all major supply chain attacks) and leave you exposed to one of the most critical parts of your infrastructure.

    Therefore, a new approach is needed to mitigate known and unknown risks in the changing supply chain environment. this guide Reviews all known and unknown risks in supply chains, suggests new ways of looking at things, and provides a great reference (or introduction!) to the area of ​​supply chain risk.


    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.