Skip to main content

Open-source security really shouldn't be this leaky

As businesses become increasingly reliant on free and open source (FOSS) software, unnecessary risks to their security posture are being taken. 

That's according to the latest report from software supply chain security firm Sonatype, which paints a dire picture of the types of open-source software that businesses are relying on, perhaps as a means to cut software costs.

As per the company's State of the Software Supply Chain Report, now in its eighth year, developers download 1.2 billion vulnerable dependencies every month, and of that number, 96% have had a non-vulnerable alternative.

A surge in OSS supply chain attacks

Attacking open-source repositories that are later downloaded and integrated into corporate software is a clear example of a supply chain cyberattack. 

With some 1,500 dependency changes per application every year, maintaining open-source ecosystems puts a great deal of pressure on developers, and mistakes are always going to be made.

Perhaps as a result, Sonatype is reporting that this type of cyberactivity has seen a massive surge, increasing by 633% year-on-year. 

However, it believes there's a solution: primarily, minimizing dependencies and speeding up software updates on endpoints. It also recommends raising awareness of vulnerable FOSS dependencies among engineering professionals.

Sonatype found that over two-thirds (68%) were confident their apps weren’t using vulnerable libraries, despite that fact that the same percentage of enterprise apps - 68% - were found to contain known vulnerabilities in their open-source software components. 

What’s more, IT managers were over twice as likely to believe that their firms address software issues regularly during the development stage than their IT security peers. 

For Sonatype, businesses need to simplify and optimize the software development process with smarter tools and more visibility, and better automation.

Supply chain attacks have been some of the most devastating cyber-incidents ever in recent years, including incidents based on the log4j vulnerability, and the SolarWinds compromise. Even today, cybercriminals are compromising organizations of all shapes and sizes using the log4j flaw. 

Via VentureBeat.

Source: TechRadar

Popular posts from this blog

Android 12 will bring the end of third-party share menus

Apps like Sharedr will no longer be able to replace the default share dialog. What you need to know Third-party apps will not be allowed to replace the Android share menu in Android 12. You will no longer be able to set apps like Sharedr as the default. Google says it never intended to allow third-party apps to replace the official Sharesheet. One of Android 12 's biggest highlights is the new Material You design language, which brings major changes to nearly every key UI component. Android 12 will also introduce a major change to the way users share links and photos, according to a report from XDA Developers . On Android 11 , Google allows third-party apps and OEMs to fully customize the Android Sharesheet, which is the reason why the share dialog differs from one app to another. It is even possible to completely bypass the official Android Sharesheet by setting an app like Sharedr as the default Sharesheet. In addition to providing a more consistent experience, Sharedr

The new Amazon Fire HD 10 is growing into a viable productivity tablet

An already good entertainment device finally gets productive. Amazon has been busy churning out a whole host of new devices and upgrades to existing devices over the past several months. Earlier this year, I reviewed the excellent Echo Buds (2nd Gen) , and even the fantastic Echo Frames (2nd Gen), have since been updated to include options with sunglass and blue light filtering lenses . In early May, we also learned that Amazon was refreshing the Echo Show 5 and Echo Show 8 and that it was even rolling out its first Echo Show for kids . While newer and more novel products like the ones mentioned above often see a faster update cycle, more mature devices like Kindle e-readers and Fire tablets go longer between new versions. In fact, the last update to the Fire HD 10 line was back in 2019, so, understandably, Amazon was ready to reinvigorate its flagship tablet. Not only did it update the specs and colors on the Fire HD 10, but it also gave us a second version in the Fire HD 10 Plu

Google Announces Support for Account Passkeys

Google today announced that it is introducing support for passkeys, providing an easier and more secure login method for Google accounts. Apple integrated passkeys into iOS with the launch of iOS 16 , and it is also available in iPadOS 16.1 and later as well as macOS Ventura . Passkeys are an industry standard developed by the FIDO Alliance and the World Wide Web Consortium, so Google's passkey integration will work on Apple devices as well as on other devices that support the feature. As Google notes: Last year — alongside FIDO Alliance, Apple and Microsoft — we announced we would begin work to support passkeys on our platform as an easier and more secure alternative to passwords. And today, ahead of World Password Day, we've begun rolling out support for passkeys across Google Accounts on all major platforms. They'll be an additional option that people can use to sign in, alongside passwords, 2-Step Verification (2SV), etc. Passkeys are both easier to use and more

Wondershare Photo Collage Studio

Wondershare Photo Collage Studio Studio integrated workshop create albums of your digital photos Yes with this program you can create Albums wonderful from your digital photos and keep them you can create albums stunning so wonderful additions distinctive not imagine it The program supports hundreds of templates and frameworks that can be used during the creation of your album from your digital photos and keep your album in a computer Create beautiful albums and you can add a lot through this program distinctive and you can with this program, add effects beautiful and can set the time to add effects and allows you to program import all image formats and also features a unique interface easier for the professional user and the novice to use this program if you want to view images through your computer, this program will add a great aesthetic touch to browse your photos through this program is a wonderful experience import all image formats