Common Information
Type Value
Value
www.sonatype.com
Category
Type Domain
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-11-13 2 Sonatype recognized as a leader in SCA software in Forrester Wave
Details Website 2024-11-12 2 Fake IP checker utilities on npm are crypto stealers
Details Website 2024-11-04 2 Securing your software supply chain with CISA's new SBOM guidance
Details Website 2024-10-31 2 Lottie Player compromised in supply chain attack — all you need to know
Details Website 2024-10-23 2 The scale of open source: Growth, challenges, and key insights
Details Website 2024-10-18 2 The transformation of open source: Lessons from the past decade
Details Website 2024-10-11 2 ADDO session: Secure your application supply chain on AWS
Details Website 2024-10-10 2 ADDO session: Building observability to increase resiliency
Details Website 2024-10-08 2 Revolutionizing software development: Frank Roe's keynote at ADDO
Details Website 2024-10-08 2 Unmasking the invisible threat: Ilkka Turunen's keynote at ADDO
Details Website 2024-10-01 2 Cybersecurity Awareness Month: Building a safer digital world together
Details Website 2024-09-24 2 SBOM-a-Rama Fall 2024: Sonatype's top 5 takeaways
Details Website 2024-09-20 2 Simplify NIS2 compliance with Sonatype
Details Website 2024-09-19 2 Tackle Cyber Resilience Act requirements with our CRA checklist
Details Website 2024-09-19 2 Sonatype can help you navigate DORA compliance
Details Website 2024-09-12 2 A proactive defense: Utilize SBOMs and continuous monitoring
Details Website 2024-09-11 2 Vulnerability handling requirements for NIS2 compliance
Details Website 2024-09-06 2 Summer compliance webinar series: Understanding DORA compliance
Details Website 2024-09-03 2 Navigating new regulations and the role of SBOMs in software security
Details Website 2024-08-23 48 每周高级威胁情报解读(2024.08.23~08.29)
Details Pdf 2023-01-30 167 Future/Tense Trend Micro Security Predictions for 2023
Details Pdf 2023-01-20 454 CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review