
Xiid Blog
5 Ways Hackers Target CI/CD Pipelines (and How to Stop Them)
CI/CD pipelines are the backbone of modern software delivery, but they've become prime targets for attackers seeking to compromise entire software supply chains.
The internet is not secure by design. What can we do?
The internet is, at its core, a collection of software jammed together over time, vulnerable to the same ever-changing security challenges that plague other applications. The internet was not created to be “secure by design”.
Solving the OpenSSH Zero Day Vulnerability’s Root Cause
The recent discovery of critical vulnerabilities in OpenSSH (CVE-2024–6387and CVE-2024–6409) has sent shockwaves through the cybersecurity community.