Resources

Supply Chain Security, in plain English.

Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.

All (2193)AI Security (338)DevSecOps (175)Best Practices (168)Open Source Security (142)Vulnerability Analysis (103)Industry Analysis (100)Incident Analysis (86)Regulatory Compliance (74)Container Security (74)Application Security (73)Compliance (72)Vulnerability Management (59)Software Supply Chain Security (51)Threat Intelligence (41)Cloud Security (39)Supply Chain Attacks (36)Product (35)SBOM (34)SBOM & Compliance (30)Supply Chain Security (25)Ransomware (21)Infrastructure Security (20)Industry Guides (19)Compliance & Regulations (18)Emerging Technology (17)Case Studies (17)Risk Management (16)Tool Reviews (16)Incident Response (15)Security Strategy (13)Dependency Security (11)Web Security (11)Kubernetes Security (9)Company (8)Architecture (8)Industry Trends (7)Secure Development (7)AppSec (7)How-To Guide (7)Zero-Day Exploits (7)Network Security (7)Dependency Management (7)Data Breach (7)Regulation (6)Research (6)Tutorials (6)Security Operations (6)Organizational Security (6)Developer Security (6)Open Source (5)Breach Analysis (5)Code Security (5)Agent Security (4)Product Launch (4)Offensive Security (4)Tool Comparisons (4)Standards (3)Tools (3)Build Security (3)Supply Chain (3)Vulnerability Research (3)Compliance & Frameworks (3)Regional Security (3)Policy & Compliance (3)SBOM Standards (3)Software Supply Chain (3)Analysis (3)Startup Security (3)Mobile Security (3)Hardware Security (3)Security (2)Frameworks (2)Zero-Day Analysis (2)Industry News (2)Release (2)SBOM and Compliance (2)Security Management (2)Threat Actors (2)API Security (2)Security Architecture (2)Security Culture (2)Social Engineering (2)DeFi Security (2)Cryptocurrency Security (2)Technical (1)Healthcare (1)Events (1)Policy (1)Product Update (1)Engineering (1)Language Security (1)Emerging Threats (1)Privacy (1)Lifecycle Management (1)Career Development (1)Tools & Platforms (1)Threat Modeling (1)Browser Security (1)Threat Analysis (1)Business Continuity (1)Runtime Security (1)Governance (1)Healthcare Security (1)Credential Attacks (1)Identity Security (1)PKI Security (1)Architecture Security (1)Nation-State Threats (1)Tools & Techniques (1)Privacy & Security (1)

Articles

RSS feed
Network Security

BGP Hijacking and Software Distribution Security

BGP hijacking lets attackers reroute internet traffic at the network level, silently intercepting software downloads and updates. This is one of the most powerful yet overlooked supply chain attack vectors.

Nov 28, 20217 min read
Data Breach

Panasonic Data Breach: Four Months of Undetected Network Access

Panasonic disclosed a data breach in November 2021, revealing that attackers had maintained access to its network for over four months before detection — highlighting the persistent challenge of dwell time.

Nov 26, 20215 min read
Zero-Day Exploits

Zoho ManageEngine CVE-2021-44077: When IT Management Tools Get Owned

APT actors exploited CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus to breach critical infrastructure. An unauthenticated RCE in the software that manages your IT.

Nov 20, 20216 min read
Tools & Techniques

Software Composition Analysis: The 2021 Buyer's Guide

SCA tools have exploded in number and capability. Here's how to evaluate them without getting lost in vendor marketing.

Nov 20, 20218 min read
Supply Chain Security

XcodeGhost Revisited: How a Trojanized IDE Infected Thousands of iOS Apps

XcodeGhost compromised Apple's developer toolchain by distributing a modified Xcode IDE. Years later, the attack remains a textbook example of build-tool supply chain compromise.

Nov 15, 20216 min read
Data Breach

Robinhood Data Breach: Social Engineering Strikes the Trading Platform

A social engineering attack on a Robinhood customer support employee exposed personal data of approximately 7 million users, revealing the persistent vulnerability of human-facing systems.

Nov 10, 20215 min read
Compliance & Regulations

NTIA SBOM Minimum Elements: What Your SBOM Actually Needs to Contain

The NTIA published its minimum elements for SBOMs in July 2021. Here's a practical breakdown of what's required, what's optional, and where most organizations fall short.

Nov 10, 20218 min read
Vulnerability Analysis

Vulnerability Prioritization: Beyond CVSS Scores

CVSS scores alone lead to alert fatigue and misallocated resources. Here's how EPSS, reachability analysis, and exploit intelligence create a smarter prioritization model.

Nov 1, 20216 min read
DeFi Security

Cream Finance DeFi Hack: $130 Million Stolen Through Flash Loan Exploit

Cream Finance suffered its third exploit in 2021, losing $130 million through a sophisticated flash loan attack that exposed fundamental vulnerabilities in DeFi lending protocols.

Oct 28, 20216 min read
Page 237 of 244

Stay informed

Weekly insights on software supply chain security, delivered to your inbox.

Blog | Safeguard — Software Supply Chain Security Insights