Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychainsecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Supermicro GPU Smuggling: What the Indictment Reveals
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 21
Supermicro GPU Smuggling: What the Indictment Reveals
#
semiconductorindustry
#
supplychainsecurity
#
exportcontrols
#
aihardware
Comments
Add Comment
7 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 14
Agent.BTZ — how one USB stick rewrote modern cyber defence
#
cybersecurity
#
supplychainsecurity
#
airgap
#
malware
1
 reaction
Comments
Add Comment
2 min read
How to Detect and Recover From a Compromised Container Scanner
Alan West
Alan West
Alan West
Follow
Mar 23
How to Detect and Recover From a Compromised Container Scanner
#
security
#
containers
#
devops
#
supplychainsecurity
Comments
Add Comment
5 min read
Should RubyGems/Bundler Have a Cooldown Feature?
SHIBATA Hiroshi
SHIBATA Hiroshi
SHIBATA Hiroshi
Follow
Mar 19
Should RubyGems/Bundler Have a Cooldown Feature?
#
ruby
#
security
#
supplychainsecurity
#
packaging
60
 reactions
Comments
5
 comments
4 min read
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 20
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
#
ai
#
vulnerabilityinsights
#
supplychainsecurity
#
opensourcesecurity
Comments
Add Comment
11 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Feb 17
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report
#
devsecops
#
cybersecurity
#
zerotrust
#
supplychainsecurity
Comments
Add Comment
3 min read
How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 11
How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware
#
ai
#
opensourcesecurity
#
securitylabs
#
supplychainsecurity
5
 reactions
Comments
Add Comment
6 min read
Exploitability Isn’t the Answer. Breakability Is.
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 13
Exploitability Isn’t the Answer. Breakability Is.
#
supplychainsecurity
#
vulnerabilityinsights
#
javascript
#
node
Comments
Add Comment
5 min read
When browser extensions become live surveillance
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
When browser extensions become live surveillance
#
mlsecurity
#
browsersecurity
#
supplychainsecurity
#
privacy
2
 reactions
Comments
1
 comment
1 min read
Improved Dependency Submission for GitHub Actions
Jesse Houwing
Jesse Houwing
Jesse Houwing
Follow
Dec 27 '25
Improved Dependency Submission for GitHub Actions
#
githubactions
#
github
#
supplychainsecurity
#
security
Comments
Add Comment
3 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account