NVD delays highlight vulnerability management woes: Put malware first

How to mitigate risk from secrets leaks

This community is due an apology

Developers beware: Imposter HTTP libraries lurk on PyPI

IconBurst: NPM software supply chain attack grabs data from apps and websites

Researchers discovered 725 Ruby libraries on the official RubyGems repository contained malware intended to copy users' clipboards, targeting bitcoin payments

Three New DDE Obfuscation Methods