Posted By
- @AAKL@infosec.exchange
- @campuscodi@mastodon.social
- @lobsters@botsin.space
- @malwarejake@infosec.exchange
- @netsec@botsin.space
- @obivan@infosec.exchange
- @ramichaelseidlitz@legal.social
- @ramichaelseidlitz@mastodon.cloud
- @_r_netsec@infosec.exchange
- @tuist@fosstodon.org
Tags
- 100,000
- 3
- A
- ACCE
- Accounts
- Actor
- Acts
- Adoption
- Advanced
- Almost
- Amazon
- An
- Analysis
- Answer
- Api endpoint
- App ecosystem
- Apple
- Apple devices
- Apple TV
- Application
- Apps
- Arbitrariness
- Arbitrary code execution
- Artifact
- Artifacts
- Aspect
- At Risk
- Attack
- Attacker
- Attackers
- Attention
- Authenticity
- Author
- Authorization
- Authors
- Based on
- Being
- Be Used To
- Billions
- Blackmail
- Card
- Care
- Catastrophe
- Centralisation
- Centralized repository
- Chain
- Chains
- Checksum
- Choice
- CI/CD
- Ci/cd pipeline
- Claim
- CLI
- Client
- CocoaPods
- Code
- Codebase
- Code execution
- Community
- Component
- Components
- Composed
- Compromise
- Compromised
- Content
- Continuity
- Continuous delivery
- Continuous integration
- contributing
- Controller
- Corporate
- Correctness
- Credit
- Credit card
- Critical
- Critical Role
- CURL
- Customer
- Damage
- Delivery
- Dependency
- Dependency manager
- Deployment
- Described
- Detail
- Developer
- Development
- Device
- DevOps
- Disclosure
- Distribution
- Document
- Documentation
- Documented
- Downloaded
- Downstream
- Dropbox
- Economics
- Ecosystem
- Email address
- Email verification
- Enabling
- Endpoint
- End user
- Entitled
- Estimation
- E.V.A.
- Every
- Execute
- Execution
- Exercise
- Existence
- Explicit
- Exploit
- Exploits
- Explore
- Expose
- Exposed
- Extra
- Famous
- Files
- Finance
- Follows
- Format
- Frameworks
- Fraud
- Free Reign
- GitHub
- Governance
- Grant
- Grants
- Guideline
- Guidelines
- Harm
- Header
- Http header
- Hundred
- Hypertext Transfer Protocol
- Identified
- If
- Impact
- Impaction
- Impossible
- Include
- Includes
- Inevitable
- Infection
- Infiltration
- Information security
- Information sensitivity
- Informed
- Infrastructure
- Injection
- Insecure
- Insert
- Integrate
- Integration
- Integrity
- iOS
- It Follows
- Itself
- It's Not Unusual
- Keep
- Known
- Leader
- Leaving
- Legal
- Legal liability
- Libraries
- Limit
- MacOS
- Maintenance, repair and operations
- Malicious
- Malware
- Manage
- Manager
- Manipulated
- Manipulation
- Materials
- Mechanism
- Medical
- Medical Record
- Mention
- Mentions
- Metadata
- Microsoft
- Microsoft Teams
- Migration
- Milan the Leather Boy
- Millions Billions
- Mobile
- Mobile app
- Mobile River
- Modern
- Most
- MX record
- Need
- Needs
- Netflix
- New
- Noticed
- Npm
- Objective-C
- Omnipresence
- Opaque
- Open source
- Open-source software
- Open the Door
- Originally
- Original source
- Orphan
- Over
- Oversight
- Owners
- Ownership
- Package
- Package manager
- Package managers
- Patched
- Path
- Percentage
- Perform
- Periodicity
- Pipeline
- Platform
- Pod
- PODS
- Popular
- Popular choice
- Pose
- Poses
- Proprietary
- Proprietary software
- Public api
- Public housing
- Publishing
- Put
- Python Package Index
- Range
- Ransomware
- Record
- Red team
- Register
- Registered
- Registration
- Remedy
- Remote
- Replace
- Repository
- Reputational risk
- Request
- Requirement
- Research
- Researcher
- Reset
- Responsibility
- Responsible disclosure
- Result
- Retain
- Risk
- Scale the Summit discography
- Scan
- Secure
- Security
- Security researcher
- Security tools
- Sensitive
- Sensor
- Server
- Severity
- Short
- Signing
- Snapchat
- Software
- Software development
- Some
- Source
- Source code
- Specification
- Spoofing
- Spread
- Steps
- Still
- Store
- Straightforward
- Supply
- Supply chain
- Supply chain attack
- Supply chain security
- Susceptible individual
- Suspicion
- Swift
- Targeted
- Teams
- Technical
- Temporary
- Term
- Terms
- The 100
- The Mechanism
- Then
- The Package
- The source
- The Swift
- The time
- Third party
- Third-party libraries
- Thousand
- TikTok
- Token Thi
- Trunk
- Unclaimed
- Uncovered
- Uniqueness
- Unknown
- Unusual
- Updates
- Upload
- Validate
- Validation
- Verification
- Verification process
- Verify
- Vulnerability
- Vulnerable
- Web service
- When
- Who
- Wide
- Wide Open
- Workflow
- Xcode
- Yahoo
- Zero
- Zero-day
- Zynga
Linking Domains
- Linked by: 9to5mac.com
- Linked by: arstechnica.com
- Linked by: cyberinsights.substack.com
- Linked by: gizmodo.com
- Linked by: hackaday.com
- Linked by: heise.de
- Linked by: pcmag.com
- Linked by: techmeme.com