Tagged articles
12 articles
Page 1 of 1
Black & White Path
Black & White Path
May 13, 2026 · Information Security

How 84 npm Packages Were Poisoned via a Legitimate CI/CD Pipeline

On May 11, 2024, attackers injected 84 malicious versions across 42 @tanstack packages into the npm registry, all bearing valid SLSA Level 3 signatures, by hijacking TanStack's CI/CD workflow through a Pwn Request, cache poisoning, OIDC token extraction, and rapid release, exposing a critical supply‑chain vulnerability.

OIDCSLSASecurity
0 likes · 18 min read
How 84 npm Packages Were Poisoned via a Legitimate CI/CD Pipeline
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 25, 2025 · Information Security

How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI

This article examines the core applications of Software Bill of Materials (SBOM) and the SLSA framework across vulnerability response, license compliance, merger due‑diligence, and container image integrity, quantifies their return on investment, and showcases real‑world implementations by leading tech firms, highlighting how they enhance enterprise security, operational efficiency, and competitive advantage.

ROISBOMSLSA
0 likes · 17 min read
How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI
DevOps
DevOps
Nov 9, 2023 · Information Security

Introducing SLSA: An End‑to‑End Framework for Software Supply Chain Integrity

This article translates Google's SLSA framework paper, explaining software supply chain threats, the four SLSA levels, mitigation strategies, a provenance generation example, and concluding with its impact on software security, while also noting related DevOps certification offerings.

SLSAprovenancesoftware supply chain
0 likes · 12 min read
Introducing SLSA: An End‑to‑End Framework for Software Supply Chain Integrity
DevOps Engineer
DevOps Engineer
Jun 11, 2023 · Information Security

Understanding SLSA: A Guide to Software Supply Chain Security and Levels

This article explains the SLSA (Supply chain Levels for Software Artifacts) framework, outlines common software supply‑chain threats, details the four SLSA levels and their requirements, discusses limitations, and reviews tools such as OpenSSF Scorecard, slsa‑verifier and Sigstore for improving software artifact integrity.

SLSASecurityartifact provenance
0 likes · 15 min read
Understanding SLSA: A Guide to Software Supply Chain Security and Levels
Continuous Delivery 2.0
Continuous Delivery 2.0
Jan 10, 2023 · Information Security

Understanding Software Supply Chain Security and the SLSA Framework

The article explains why software supply chain security is increasingly critical, introduces the SLSA (Supply‑Chain Levels for Software Artifacts) framework and its three trust boundaries, outlines common risk points from code commit to package distribution, and discusses mitigation strategies such as mandatory code review, robot‑account controls, and automation.

SLSASecurityci/cd
0 likes · 11 min read
Understanding Software Supply Chain Security and the SLSA Framework
DevOps
DevOps
Dec 5, 2022 · Operations

Key Findings from the 2022 Accelerate State of DevOps Report: Software Delivery, Organizational Performance, and Software Supply Chain Security

The 2022 Accelerate State of DevOps report, based on surveys of 33,000 professionals, reveals that software delivery performance, operational reliability, and organizational culture—especially high‑trust, low‑blame environments—drive organizational outcomes, while secure software supply chain practices such as SLSA and NIST SSDF further boost performance and reduce burnout.

DevOpsReliabilitySLSA
0 likes · 8 min read
Key Findings from the 2022 Accelerate State of DevOps Report: Software Delivery, Organizational Performance, and Software Supply Chain Security