universeodon.com is part of the decentralized social network powered by Mastodon.
Be one with the #fediverse. Join millions of humans building, creating, and collaborating on Mastodon Social Network. Supports 1000 character posts.

Administered by:

Server stats:

3.2K
active users

Learn more

#devsecops

13 posts13 participants0 posts today

⚠️ Cyber threat: AI code assistants are opening up new supply chain vulnerabilities.

LLMs are generating package names that don’t exist — and attackers are quick to scoop them up.
This tactic — dubbed slopsquatting — is as clever as it is dangerous.

🤖 Fake package names created by AI
💣 Threat actors publish malicious lookalikes
🔗 Developers unknowingly install backdoors
🧠 The fix: verify everything, especially autogenerated code

This is where secure coding and secure prompting must intersect.

#AI #DevSecOps #SoftwareSupplyChain #CyberSecurity #AIInDevelopment
theregister.com/2025/04/12/ai_

The Register · LLMs can't stop making up software dependencies and sabotaging everythingBy Thomas Claburn

Developers are moving faster than ever with tools like GitHub Copilot and Cursor. But AppSec teams are falling behind.

The result?
A tidal wave of code
62% of AI-generated code has flaws
Nearly 30% contains known security weaknesses

Existing tools weren’t built for this.

Next week, we’re announcing something new. A new way for AppSec teams to understand what’s changing and why it matters.

Stay tuned.

#AppSec#AI#LLM

AI-generated code is fast—but is it secure?

In this Redefining CyberSecurity episode, we talk vibe coding, developer responsibility, and why security teams need to assume they already have AI-built code in their stack.

Featuring Izar Tarandach + Sean Martin on @ITSPmagazine

🎧 Watch here: youtu.be/Lv2NTAj3WIY

www.youtube.com - YouTubeEnjoy the videos and music that you love, upload original content and share it all with friends, family and the world on YouTube.

🎙️ Going Live in 15 Minutes — Come Join Us!

I’m about to tune in for a live ITSPmagazine webinar that dives into a topic I truly care about:

Secure Coding = Developer Empowerment

It’s not just about reducing risk — it’s about investing in developers, boosting velocity, and building better software from the start.

🗓️ Today – April 18

🎙️ Hosted by ITSPmagazine

💡 In partnership with Manicode Security

Jim Manico

Jimmy Mesta 🤙

Sean Martin, CISSP

Will be talking about:

✅ Why most developers never get proper secure coding training

✅ How to get leadership buy-in for better dev security

✅ Why this isn’t just security—it’s a career boost

If you’ve got time, join us live. If not, watch it on demand. Either way, it’s a conversation worth having.

👉 Join here:

crowdcast.io/c/secure-coding-e

#ApplicationSecurity, #DeveloperEmpowerment, #SecureCoding, #DevSecOps, #softwaresecurity, #cybersecurity, #infosec, #ITSPmagazine

crowdcastSecure Coding = Developer Power — An ITSPmagazine Webinar with Manicode SecurityRegister now for Secure Coding = Developer Power — An ITSPmagazine Webinar with Manicode Security on crowdcast, scheduled to go live on April 16, 2025, 03:30 PM EDT.

The #KubeCon recordings are now on YouTube! We'll be posting links to all the #OpenPolicyAgent related ones as we watch them. First out is the #OPA maintainer track session, where @charlieegan3 and @anderseknert give a short introduction to OPA and Rego, followed by a deep-dive into recent performance improvements, and a sneak peek at the project roadmap. Check it out!

youtube.com/watch?v=XtA-NKoJDaI

Big news! 🎉 ActiveState has hit a critical milestone in Java support, reinforcing our leadership in intelligent remediation for vulnerability management.

With expanded Java coverage, we’re empowering enterprises to:

✅ Proactively manage vulnerabilities
✅ Strengthen their software supply chains
✅ Accelerate secure development

Learn how this milestone is transforming open source security: prnewswire.com/news-releases/a

Researchers found a novel supply chain threat in GitHub Copilot and Cursor: attackers can inject hidden prompts in config files to manipulate AI-generated code, creating persistent, invisible backdoors. A new frontier in poisoning the dev pipeline.

pillar.security/blog/new-vulne

www.pillar.securityNew Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents