• Platform
    Platform
    • SDLC Inventory auto-discovery & analysis
    • security setting Security Posture Management
    • CI/CD Security
    • Data Bug Open-Source Malware Detection
    • Hardcoded Secrets Detection
    • Firewall Infrastructure as Code Security
    • Anomaly Detection
    • Continuous Compliance & SBOM
    Download Our Datasheet
    Download Solutions Datasheet
  • Use Cases
    Use Cases
    • Asset discovery, inventory and security posture classification
    • Prioritised and contextual threat management
    • Integrity and security of product releases
    • CI/CD Workflow Automation
    • Governance and compliance
    • Executive reporting and monitoring
    Download Our Datasheet
    Download Solutions Datasheet
  • Company
    • About
    • Events
    • Press & Media
    • Contact us
  • Resources
    Resources
    • Resource Library
    • Watch Video Demo
    • Xygeni Platform Datasheet
    • Webinars
    • Webinar ON DEMAND
    CI/CD Security From new attack tactics to protection strategies
    Securing the Software Supply Chain
    Watch Webinar
  • Blog
  • Login
  • Platform
    Platform
    • SDLC Inventory auto-discovery & analysis
    • security setting Security Posture Management
    • CI/CD Security
    • Data Bug Open-Source Malware Detection
    • Hardcoded Secrets Detection
    • Firewall Infrastructure as Code Security
    • Anomaly Detection
    • Continuous Compliance & SBOM
  • Use Cases
    Use Cases
    • Asset discovery, inventory and security
      posture classification
    • Prioritised and contextual threat
      management
    • Integrity and security of product releases
    • CI/CD Workflow Automation
    • Governance and compliance
    • Executive reporting and monitoring
  • Resources
    • Resource Library
    • Access Video Library
    • Xygeni Platform Datasheet
    • Webinars
  • Blog
  • Company
    • About
    • Events
    • Press & Media
    • Contact us
  • Login
  • Book a demo
  • Watch Demo Library
Watch Video Demo
Book a Demo

15 Sep Strengthening Telco Defenses Against Supply Chain Attacks

Posted at 08:59h in Attacks, Attacks Analysis, CI/CD Security, SDLC, Software Supply Chain by Jesús Cuadrado 0 Comments
Share

Uncover the risk of supply chain attacks on telecoms, safeguard data, and embrace Software Bill of Materials (SBOM) for supply chain security....

Read More

27 Apr 3CX Supply Chain Attack: Lessons Learned

Posted at 15:46h in Attacks, Attacks Analysis, build security, Software Supply Chain by Luis Rodríguez 0 Comments
Share

Software Supply Chain Attacks Analysis 3CX is a well-known company providing VoIP and Unified Communications products. They claim to have over 600,000 installations and 12M daily users. Undoubtedly a tempting target for bad actors. By the end of March 3CX was attacked in a sophisticated software supply...

Read More
Categories
  • Attacks
  • Attacks Analysis
  • build security
  • CI/CD Security
  • Code tampering
  • Misconfiguration
  • SDLC
  • Secrets leak
  • Software Supply Chain
  • Version-pinning
  • Webinars
Latest Posts
  • 3CX Supply Chain Attack: Lessons Learned
    27 April, 2023
  • 5 Essential Tips for Securing Your Software Supply Chain
    20 March, 2023
  • Agile and Security: Shaping New Landscapes in Software Supply Chains
    05 May, 2023
Tags
3CX Attacks Attacks Analysis Bad.build build security CI/CD CI/CD Security Code tampering cybersecurity google cloud bug Misconfiguration NSA NSA guidelines Secrets leak SLDC Software Supply chain sscs guidelines Supply chain Version-pinning webinars
Place your banner
Why are we here

Lorem ipsum dolor sit amet, conse ctetuer adipiscing elit, sed diami nonum nibhie vixtus euismod.

xygeni.logo.corregido_blanco

© 2023 Xygeni. All rights reserved

Linkedin-in Twitter

Platform

  • SDLC Inventory auto-discovery & analysis
  • Security Posture Management
  • CI/CD Security
  • Open-Source Malware Detection
  • Hardcoded Secrets Detection
  • Infrastructure as Code Security
  • Anomaly Detection
  • Continuous Compliance & SBOM

Use Cases

  • Asset discovery, inventory and security posture classification
  • Prioritised and contextual threat management
  • Integrity and security of product releases
  • CI/CD Workflow Automation
  • Governance and compliance
  • Executive reporting and monitoring

Resources

  • Blog
  • Xygeni Solution Datasheet
  • Watch Video Demo

Company

  • About
  • Events
  • Press & Media
  • ICE
  • Contact us

Legal

  • Privacy Policy
  • Cookie Policy
  • Legal Notice
  • Term of Use

join our Newsletter

Sign up for our newsletter and stay informed on the latest news in SSCS.