
Blogs
A Curated Collection of Writings, Research, and Solutions

Application Security
CodeQL Compromised: How Public Secret Exposure Led to an Attack
In March 2025, the cybersecurity community was rocked by a significant supply chain attack targeting a popular third-party GitHub Action, tj-actions/changed-files. This incident, tracked as CVE-2025-30066, has exposed vulnerabilities in up to 23,000 repositories.
.png)
April 2, 2025
5 Minutes
Read More


Data Protection
Addressing RBI's Guidelines for Digital Payment Applications with CleanStart
The Reserve Bank of India (RBI) has issued Master Directions on cyber resilience and digital payment system controls emphasizing a "Secure by Design" approach under application security for digital payment systems. This directive underscores the growing importance of robust security measures in India's fast-growing digital payments landscape. It also marks a significant shift toward integrating security at every stage of the software development lifecycle (SDLC). This isn't merely a compliance checkbox; it's a fundamental necessity in today's threat landscape. This blog explores the technical complexities of implementing the framework, addressing key challenges, and presenting CleanStart as a robust solution.
.png)
March 4, 2025
6 Minutes
Read More


Cyber Security
The Evolution of CISOs: From Network Guardians to Product Security Leaders
After engaging with hundreds of CISOs worldwide, it has become evident that the role of the CISO is undergoing a significant transformation. As organizations increasingly evolve into technology-centric entities, the traditional network-focused security approach is no longer adequate.
.png)
March 1, 2025
5 Minutes
Read More


Application Security
Critical NVIDIA Container Toolkit Vulnerability: CVE-2025-23359
A security vulnerability, CVE-2025-23359, has been identified in the NVIDIA Container Toolkit. This is a bypass of the original patch for CVE-2024-0132. The vulnerability was discovered by Wiz Research.
.png)
February 20, 2025
4 Minutes
Read More


Application Security
Supply Chain Attack on lottie-player: A Wake-up Call for JavaScript Security
In February 2024, the JavaScript community faced another significant supply chain security incident when the popular lottie-player package was compromised. This attack serves as a stark reminder of the vulnerabilities in our modern software supply chain and the importance of maintaining robust security practices. Let’s dive into what happened, its implications, and how developers and organizations can protect themselves against similar threats.
.png)
December 18, 2024
7 Minutes
Read More


Application Security
Hidden Dangers: Why Vulnerable Container Images Cost More Than You Think
In today's cloud-native world, containers have become the building blocks of modern applications. Yet, beneath the surface of this technological revolution lurks a critical security challenge that many enterprises overlook – the security of their base container images.
.png)
December 5, 2024
5min Read
Read More


Cyber Security
The Evolution of Open-Source Software: Past, Present, and Future
Open-source software (OSS) has become a cornerstone of modern technology, driving innovation and collaboration across industries. From its humble beginnings to its current widespread adoption, OSS has transformed the tech landscape. This blog explores the journey of open-source software, its current state, and what the future holds.
.png)
November 27, 2024
6 Minutes
Read More


Data Protection
Container Image Signing: Enhancing Security in the Software Supply Chain
In today's rapidly evolving landscape of containerized applications, ensuring the integrity and authenticity of container images has become paramount. Container image signing is a crucial security practice that addresses these concerns, providing a robust mechanism to verify the origin and integrity of container images throughout the software supply chain
.png)
November 12, 2024
4min Read
Read More


Cyber Security
Busting Myths About Open Source and Containers
In the world of software development, open source and container technologies have revolutionized the way we build, deploy, and manage applications. However, several myths persist about their security and usage. Let’s debunk some of these common misconceptions. In the realm of software development, open source and container technologies have transformed the way applications are built, deployed, and managed. Despite their widespread adoption, several myths about their security and usage persist. This article aims to debunk these common misconceptions and provide a clearer understanding of the realities.
.png)
November 5, 2024
5min Read
Read More


Network Security
Strengthening Software Supply Chain Security with SLSA
In today’s digital landscape, securing the software supply chain has become a critical priority. With the increasing complexity of software development and deployment, ensuring the integrity and security of software artifacts is paramount. This is where SLSA (Supply Chain Levels for Software Artifacts) comes into play.
.png)
October 17, 2024
5min Read
Read More


Data Protection
The recent discovery of a critical vulnerability in NVIDIA
The recent discovery of a critical vulnerability in NVIDIA’s Container Toolkit (CVE-2024-0132) has sent shockwaves through the AI and DevOps communities. This vulnerability serves as a stark reminder of the hidden dangers lurking within our AI infrastructure. Here, we delve into the key lessons learned and the steps that AI practitioners and DevOps teams must take to safeguard their systems.
.png)
October 7, 2024
5min Read
Read More
