Endura Security
Endura Security @endurasecurity ·
Security scanners in CI/CD run with the same privileges they are supposed to protect. Compromise the scanner and you inherit all of them - secrets, network, build artifacts. The tooling IS the attack surface. #DevSecOps #SupplyChainSecurity
1
Xygeni
Xygeni @xygeni ·
Most tools look for CVEs, signatures, hashes. Modern malware doesn’t. It hides in deps, CI/CD, build scripts… and runs at runtime. 👉 No CVE. No alert Better question: What is this code doing when it runs? Read more →xygeni.io/blog/ai-powere…X #AppSec #DevSecOps #CyberSecurity
AI-Powered Malware Detection in SSCS | Xygeni

AI-powered malware detection stops ai malware through behavioral analysis and protects code, dependencies, and CI/CD pipelines.

From xygeni.io
8
NY-squared AI
NY-squared AI @NYsquaredAI ·
Arcjet ships inline prompt injection defense for production AI. Detecting hostile prompts at the app boundary before inference. 500+ production apps protected. Runtime AI defense is becoming table stakes. #PromptInjection #DevSecOps
2
Vineet
Vineet @dvineet9 ·
Most security issues don’t come from hackers. They come from misconfigurations. • Public S3 buckets • Open ports • Weak IAM policies Security isn’t a tool. It’s discipline. #Devsecops
8
Paweł Kucia
Paweł Kucia @PawelKucia ·
GitHub's Credential Revocation API now supports OAuth & GitHub App credentials! Revoke exposed tokens programmatically to secure your projects faster. Stay ahead in protecting your repos and integrations. #GitHub #Security #DevSecOps 🔐🚀 ⬇Oo
1
5
Knetero
Knetero @azero853 ·
Just when you thought your GitHub repos were safe... a new supply-chain attack is using invisible Unicode characters to hide malicious code in plain sight. 😱 This is why supply-chain security is EVERYONE's problem now. #CyberSecurity #DevSecOps
6
musa_codes
musa_codes @bodaguy5 ·
🚨TOP 5 CYBER SECURITY MISTAKES DEVELOPERS MAKE (and how to fix them) #cybersecurity #devSecOps 1. Hard coding secrets 2. Insecure Data storage 3. SQL injection vulnerabilities 4. Weak authentication 5. Outdated dependencies Want the fix ? 🛡️Comment below if you knKx
1
28
ZeroThreat.ai
ZeroThreat.ai @ZeroThreat_ZT ·
Security testing is stuck in 2015. Modern apps = APIs, SPAs, complex flows. Most tools = static scans, no real attack paths. Meet Agentic AI Pentesting by ZeroThreat. Find → Exploit → Prove. Real risk. No noise. Try: zurl.co/ajAXp #AppSec #DevSecOps #AI
20
CVERiskPilot
CVERiskPilot @cveriskpilot ·
Migrating CVERiskPilot to GCP — Cloud Run, Cloud SQL, Cloud Armor WAF, and KMS encryption at rest. Faster scans. Stronger security posture. Enterprise-grade infra for enterprise-grade vuln management. #CVERiskPilot #AppSec #DevSecOps #GCP
17
Endura Security
Endura Security @endurasecurity ·
Every tool in your CI/CD pipeline runs with the same level of trust - full access to secrets, network, and publish tokens. We lock down production like a vault but let the build environment run on an honor system. #DevSecOps #SupplyChainSecurity
15
JFrog
JFrog @jfrog ·
Your team builds fast, but are they building well? The JFrog Academy has courses, learning paths, practice labs, and certifications designed for #developers, #DevSecOps engineers, and #security managers. Whether you're just getting started with the JFrog Platform or leveling up d JFrog Curation, there's a structured path for every skill level. Self-paced. Expert-led. Built for real-world #DevOps, #DevSecOps, and #AI / #ML. 🎓 Start learning today:academy.jfrog.coms #SoftwareSupplyChain #LearningAndDevelopment
80