Resources

Supply Chain Security, in plain English.

Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.

All (2193)AI Security (338)DevSecOps (175)Best Practices (168)Open Source Security (142)Vulnerability Analysis (103)Industry Analysis (100)Incident Analysis (86)Regulatory Compliance (74)Container Security (74)Application Security (73)Compliance (72)Vulnerability Management (59)Software Supply Chain Security (51)Threat Intelligence (41)Cloud Security (39)Supply Chain Attacks (36)Product (35)SBOM (34)SBOM & Compliance (30)Supply Chain Security (25)Ransomware (21)Infrastructure Security (20)Industry Guides (19)Compliance & Regulations (18)Emerging Technology (17)Case Studies (17)Risk Management (16)Tool Reviews (16)Incident Response (15)Security Strategy (13)Dependency Security (11)Web Security (11)Kubernetes Security (9)Company (8)Architecture (8)Industry Trends (7)Secure Development (7)AppSec (7)How-To Guide (7)Zero-Day Exploits (7)Network Security (7)Dependency Management (7)Data Breach (7)Regulation (6)Research (6)Tutorials (6)Security Operations (6)Organizational Security (6)Developer Security (6)Open Source (5)Breach Analysis (5)Code Security (5)Agent Security (4)Product Launch (4)Offensive Security (4)Tool Comparisons (4)Standards (3)Tools (3)Build Security (3)Supply Chain (3)Vulnerability Research (3)Compliance & Frameworks (3)Regional Security (3)Policy & Compliance (3)SBOM Standards (3)Software Supply Chain (3)Analysis (3)Startup Security (3)Mobile Security (3)Hardware Security (3)Security (2)Frameworks (2)Zero-Day Analysis (2)Industry News (2)Release (2)SBOM and Compliance (2)Security Management (2)Threat Actors (2)API Security (2)Security Architecture (2)Security Culture (2)Social Engineering (2)DeFi Security (2)Cryptocurrency Security (2)Technical (1)Healthcare (1)Events (1)Policy (1)Product Update (1)Engineering (1)Language Security (1)Emerging Threats (1)Privacy (1)Lifecycle Management (1)Career Development (1)Tools & Platforms (1)Threat Modeling (1)Browser Security (1)Threat Analysis (1)Business Continuity (1)Runtime Security (1)Governance (1)Healthcare Security (1)Credential Attacks (1)Identity Security (1)PKI Security (1)Architecture Security (1)Nation-State Threats (1)Tools & Techniques (1)Privacy & Security (1)

Articles

RSS feed
Ransomware

Colonial Pipeline Ransomware Attack: How a Single Password Shut Down America's Fuel Supply

The 2021 Colonial Pipeline attack exposed critical infrastructure vulnerabilities when a compromised VPN password led to a $4.4 million ransom and fuel shortages across the Eastern United States.

May 8, 20215 min read
Incident Analysis

Codecov Bash Uploader Compromise: A Retrospective

A single altered line in Codecov's Bash Uploader leaked CI secrets for 69 days across thousands of repos. Here is what actually happened and why.

Apr 15, 20216 min read
Risk Management

Software Escrow Agreements: The Security Layer Most Companies Forget

Software escrow agreements protect your organization when a critical vendor goes dark. Here is how to structure them with security in mind.

Mar 15, 20217 min read
Open Source Security

Rust Foundation Formation: Security Implications

The Rust Foundation launched February 8, 2021. Here is what its formation actually changed for the security of Rust and downstream ecosystems.

Feb 10, 20216 min read
Incident Analysis

SunBurst: A Supply Chain Attack Evolution Study

The SolarWinds SunBurst campaign rewrote the supply chain threat model. Five years of research reveal what changed and what defenders still miss.

Dec 18, 20206 min read
Incident Analysis

Shellshock, Five Years On: The Lessons That Stuck

Five years after CVE-2014-6271, Shellshock remains the clearest case study in how one interpreter bug becomes thousands of downstream holes.

Sep 24, 20196 min read
Incident Analysis

Heartbleed at Five Years: A Practitioner Retrospective

Five years after CVE-2014-0160, Heartbleed still shapes how we think about shared cryptographic libraries, disclosure ethics, and open-source funding.

Apr 7, 20196 min read
Incident Analysis

ASUS Live Update and ShadowHammer: The Backdoor

Operation ShadowHammer pushed a signed backdoor to roughly half a million ASUS laptops, targeting a list of 600 specific MAC addresses.

Mar 28, 20197 min read
Incident Analysis

XcodeGhost: When the Compiler Was the Attacker

XcodeGhost in 2015 infected at least 128 million iOS users through a malicious Xcode download. It is still the cleanest compiler-trust case.

Feb 18, 20197 min read
Page 243 of 244

Stay informed

Weekly insights on software supply chain security, delivered to your inbox.

Blog | Safeguard — Software Supply Chain Security Insights