OUR BLOG

Ultralytics publishes malicious PyPi packages

Ultralytics publishes malicious PyPi packages

The Ultralytics PyPi package was compromised today via a sneaky attack leveraging GitHub pull requests. Two consecutive package versions of the Ultralytics PyPi package were compromised and...

Are private bug bounty programs a good idea?

Are private bug bounty programs a good idea?

Bug bounty programs have emerged over the last 5 years as a vital tool for identifying and mitigating vulnerabilities.   Many enterprises have accepted the value of having bug bounty programs in...

Real talk about “memory-safe” languages.

Real talk about “memory-safe” languages.

You might have recently heard people talking about "memory-safe" languages and how we all need to start using them.  There is a loud contingent of people on LinkedIn and Twitter advocating that we...

What is the offensive security “Holy Trinity”?

What is the offensive security “Holy Trinity”?

What is offensive security? In today's complex cybersecurity landscape, organizations use a variety of techniques to fortify their defenses and use proactive measures to ensure the integrity of...

How can CI/CD help my team?

How can CI/CD help my team?

First, what does "CI/CD" stand for? CI/CD is an acronym used to refer to two separate and distinct parts of the software development lifecycle (SDLC), which are often discussed as one. Continuous...