-
December 12, 2022
Cycode Collaborates with CodeSee to Secure the Pipelines of Thousands of Open-Source Projects
Securing open-source projects is hard. Securing CI workflows...
-
December 1, 2022
CI-Story: How We Found Critical Vulnerabilities in StoryBook Project
Cycode found several vulnerabilities in its GitHub Actions development pipeline that may have allowed any user on the internet to...
-
June 28, 2022
All Roads Lead to Build Secrets – Or How Your Build System Could Expose The Production Environment
Every software manufacturer nowadays implements robust DevOps processes to increase its ability to deliver applications and services at high velocity....
-
June 1, 2022
TypoSquatting, RepoJacking, and Domain Takeover – The Story of the Recent Attacks
We’ve had a busy month in terms of software supply-chain incidents. In this article, we will discuss prominent recent attacks,...
-
March 18, 2022
How We Discovered Vulnerabilities in CI/CD Pipelines of Popular Open-Source Projects
Cycode discovered critical vulnerabilities in several popular open-source projects, each of which can cause a supply-chain attack through the CI...
-
February 28, 2022
Jenkins Security Best Practices
Jenkins is one of the most well-known tool for creating automation pipelines and integrating them with the rest of your...