- January 16, 2023
Detecting and Mitigating Source Code Compromise in the Wake of the CircleCI Incident
On January 4th, 2023, CircleCI reported a data breach that...
- January 5, 2023
Security Advisory: CircleCI Security Breach
CircleCI was breached. If you are using this tool immediately rotate all stored secrets and environment variables in CircleCI. These...
- March 22, 2022
Hardening Your SDLC in Response to Lapsus$ Breaches
Over the last several weeks, Lapsus$ has taken down a who's who of software development teams: NVIDIA, Samsung, Vodafone, Ubisoft,...
- December 15, 2020
Six AppSec Learnings from SolarWinds
The SolarWinds incident is a rapidly evolving situation as more and more organizations realize they’ve been breached. We don’t know...
- September 9, 2020
OWASP SAMM Framework: What You Need to Know
We here at Cycode passionately advocate for protecting your source code and the secrets within it throughout its lifecycle and...
- September 1, 2020
Security Best Practices for Azure DevOps
Microsoft Azure has been a popular platform for various kinds of cloud computing for years and, more specifically, Azure DevOps...
- June 9, 2020
The Bad Coding Habits That Leave Your Source Code Exposed
No one is perfect. Every developer, at some point will come across bad code. And at many points through their...
- May 29, 2020
Security Best Practices for Gitlab
Gitlab is an open-source power player in the SCM market, with the entire company working remotely across 65+ countries...
- May 7, 2020
Security Best Practices for Github
Most open source projects live there and it’s super easy to collaborate with teams there. But, as with any type...
- March 20, 2020
You Should Care About Securing Your Source Code
Source code houses the building blocks of your software. It’s what gives you your competitive edge, your secret strategy, your...