Tagged articles
15 articles
Page 1 of 1
AI Explorer
AI Explorer
Mar 18, 2026 · Information Security

How Tech Giants’ $12.5M Investment Is Transforming Open‑Source Security

Microsoft, Google and the OpenSSF have pledged $12.5 million to the Linux Foundation, aiming to shift open‑source security from volunteer‑driven maintenance to a systematic, corporate‑backed defense that safeguards critical infrastructure while balancing community autonomy.

Alpha-OmegaLinux FoundationOpenSSF
0 likes · 7 min read
How Tech Giants’ $12.5M Investment Is Transforming Open‑Source Security
Architecture Digest
Architecture Digest
Feb 26, 2026 · Artificial Intelligence

Why OpenClaw’s AI Agent Went Viral and Triggered Google’s Antigravity Ban

OpenClaw, an open‑source AI agent platform, surged in popularity, prompting Google to restrict its Antigravity services after abusive token usage, while its creator Peter Steinberger shares how AI‑driven coding, rapid prototyping, and security concerns shaped the project's explosive growth.

AI agentsAI‑assisted codingGoogle Antigravity
0 likes · 9 min read
Why OpenClaw’s AI Agent Went Viral and Triggered Google’s Antigravity Ban
21CTO
21CTO
Jun 21, 2025 · Information Security

Malicious Python Packages Hijacking Open‑Source Repos: The Banana Squad Threat

Security researchers at ReversingLabs have uncovered a coordinated campaign by the “Banana Squad” that injects malicious Python toolkits into hundreds of seemingly legitimate open‑source GitHub repositories, using domain squatting, repository impersonation, and hidden code obfuscation to steal sensitive data and evade detection.

GitHubReversingLabsmalicious Python packages
0 likes · 5 min read
Malicious Python Packages Hijacking Open‑Source Repos: The Banana Squad Threat
21CTO
21CTO
Apr 3, 2025 · Information Security

Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index

Sonatype’s Q1 2025 Open‑Source Malware Index identified 17,954 malicious packages—including hijacked npm crypto modules, a fake Truffle for VS Code extension, and counterfeit Solana packages—revealing that 56% of these components are associated with data breaches, a sharp rise from the 26% reported in Q4 2024, and highlighting the growing prevalence of complex, threat‑laden malware such as droppers and code‑injection threats.

data breachinformation securitymalware
0 likes · 2 min read
Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index
Wukong Talks Architecture
Wukong Talks Architecture
Apr 1, 2024 · Information Security

Investigation of the xz Backdoor Vulnerability and Its Attack Chain

A recent security analysis reveals how a malicious contributor infiltrated the open‑source xz compression tool over two and a half years, inserted a backdoor using IFUNC hooks to compromise OpenSSH, and was eventually uncovered due to a CPU‑spike bug, highlighting severe risks for Linux and macOS systems.

OpenSSHbackdoorinformation security
0 likes · 8 min read
Investigation of the xz Backdoor Vulnerability and Its Attack Chain
Programmer DD
Programmer DD
Oct 7, 2023 · Information Security

Sonatype 2023 Supply Chain Report: Open‑Source Growth, Security Risks & AI

Sonatype’s 2023 software supply chain report shows a 29% average year‑over‑year growth in open‑source projects across major ecosystems, a sharp slowdown in download growth, a doubling of malicious packages, and a rapid rise in AI/ML tool adoption among DevOps and SecOps teams.

AI adoptionDevOpsopen source security
0 likes · 5 min read
Sonatype 2023 Supply Chain Report: Open‑Source Growth, Security Risks & AI
Efficient Ops
Efficient Ops
Jun 27, 2023 · Information Security

How a Bank Secures Open‑Source Software: Practices, Policies, and Platforms

This article explains how open‑source technologies drive digital transformation in finance, outlines the regulatory "Opinions" guiding secure, compliant use, and details a comprehensive open‑source security management framework—including lifecycle standards, a dedicated platform, DevOps integration, SBOM adoption, and continuous risk mitigation.

DevOpsSBOMcompliance
0 likes · 10 min read
How a Bank Secures Open‑Source Software: Practices, Policies, and Platforms
21CTO
21CTO
Jan 3, 2023 · Information Security

How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies

Google’s open‑source OSV‑Scanner provides a powerful front‑end to the OSV vulnerability database, allowing developers to scan directories, SBOMs, and Docker images for known security issues across 16 ecosystems, outputting results in JSON or table format and supporting ignore rules for specific vulnerabilities.

OSV-ScannerSBOMdependency management
0 likes · 6 min read
How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies
Programmer DD
Programmer DD
Mar 18, 2022 · Information Security

How a Node‑IPC Supply‑Chain Attack Hijacked Vue‑CLI Projects

A malicious update to the npm package node‑ipc, used by vue‑cli, injected anti‑war code that creates unwanted files, overwrites system directories for Russian and Belarusian IPs, and sparked a community response that led to a patched vue‑cli release and detailed remediation steps.

Vue CLImalwarenode-ipc
0 likes · 5 min read
How a Node‑IPC Supply‑Chain Attack Hijacked Vue‑CLI Projects
21CTO
21CTO
Jul 3, 2021 · Information Security

How Google’s OpenSSF Scorecards Boost Open‑Source Security Ratings

Google’s open‑source security tool, OpenSSF Scorecards, now at version 2.0, automates risk assessment for thousands of projects by providing pass/fail checks, binary‑artifact analysis, dependency verification, and CI/CD token controls, helping organizations identify vulnerable code, malicious contributors, and unsafe dependencies.

OpenSSFScorecardsci/cd
0 likes · 8 min read
How Google’s OpenSSF Scorecards Boost Open‑Source Security Ratings
21CTO
21CTO
Feb 24, 2020 · Information Security

Top 10 Open‑Source Security Tools Every Professional Should Know

This article introduces ten essential open‑source security tools—including Nessus, Snort, Nagios, Ettercap, Infection Monkey, Delta, Cuckoo Sandbox, The Sleuth Kit, Lynis, and Certbot—detailing their main features, licensing models, and typical use cases for vulnerability scanning, intrusion detection, network monitoring, and forensic analysis.

Network Monitoringdigital forensicsencryption
0 likes · 9 min read
Top 10 Open‑Source Security Tools Every Professional Should Know
Efficient Ops
Efficient Ops
Apr 18, 2019 · Fundamentals

What Makes Software Trustworthy? Insights from Huawei Cloud DevCloud

The article explores the concept of trustworthy software, outlines its five key dimensions—safety, reliability, availability, security, and resilience—and describes how Huawei Cloud DevCloud is applying these principles through its open‑source mirror services and secure development practices.

ReliabilitySoftware Engineeringcloud computing
0 likes · 6 min read
What Makes Software Trustworthy? Insights from Huawei Cloud DevCloud