News, Techniques & Guides

Dependencies

A collection of 11 posts

Top Article

Introducing MavenGate: a supply chain attack method for Java and Android applications

Table of contents: Introduction Maven philosophy Method of attacks Verifying the theory Attack vectors for different project types Existing defenses Problems in implementing defenses against dependency hijacking Total number of vulnerable dependencies Vulnerable

oversecured oversecured 13 min read
Android Maven Dependencies
News, Techniques & Guides icon About Pricing Contact Us Scan Your App
card About Pricing Quick Start CI/CD API Vulnerabilities Contact Us Terms of Use Privacy Policy linkedin twitter

© 2024

This website uses cookies to improve your experience. See our Privacy Policy to learn more.

icon_call BOOK A CALL
OSZAR »