Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Founder Personal Branding Using Code: How to Use GitHub, Open-Source, and Technical Content to Drive Business Leads

Today, founders are no longer just business leaders-they're public figures, content creators, and community builders. For technical founders especially, code isn't just for building products. It's a powerful tool for building personal brands that drive leads, grow networks, and attract real business opportunities. Whether it's through GitHub contributions, open-source projects, or technical blog posts, founders can showcase their expertise while creating long-lasting value for their business.

npm Supply Chain Attack via Open Source maintainer compromise

On Monday, September 8th, a highly regarded open source developer, ~qix, was compromised via a phishing email. ~qix is an author and maintainer behind a large number of popular npm packages and found himself caught by this attack after responding to a message from the email address of support help. This resulted in the attacker taking over his npm account and having access to publish malicious versions of packages to which Qix had privileged access.

FreePBX Authentication Bypass Leading to SQL Injection and RCE (CVE-2025-57819)

A new critical vulnerability has been identified in FreePBX, the widely adopted open-source, web-based graphical user interface for managing Asterisk PBX systems. Tracked as CVE-2025-57819, this flaw affects FreePBX versions 15, 16, and 17 and enables unauthenticated attackers to bypass administrator login controls. Once inside, threat actors can perform SQL Injection attacks that lead directly to remote code execution (RCE).

Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025

Only 7 days left to secure the Early Bird registration at the OpenSSL Conference 2025, October 7 - 9 in Prague. The event will bring together lawyers, regulators, developers, and entrepreneurs to explore issues of security and privacy for everyone, everywhere.

Prioritize with Snyk's Open Source Vulnerability Experience

Prioritizing which vulnerabilities to fix across your application isn't always easy. Is it exploitable? Is it reachable? Will the update introduce breaking changes? Are there any other teams using this library that you should be aware of? What does the backlog look like if other changes need to be made? And that's just this week. Next week, it'll be the same thing all over again, with new discoveries, new version releases, and maybe even a new cybersecurity breach.

Netskope BEAM: Open Source Detector for Supply Chain Compromise

Netskope Threat Labs is pleased to announce the release of a new open-source tool that detects supply chain attacks. Our new tool, Behavioral Evaluation of Application Metrics (BEAM), requires no endpoint agent deployment and will analyze the network traffic you are already capturing in your organization to determine if your applications are communicating with unusual hosts that could be part of an attack. This tool is the subject of a 2025 Black Hat USA briefing.

Early Bird Registration Now Open for The Inaugural OpenSSL Conference 2025

Early Bird registration is now available for the inaugural OpenSSL Conference, scheduled for October 7-9, 2025, in Prague. The event will bring together leading voices in cryptography, secure systems, and open-source infrastructure. Early registrants can save up to $240 per ticket.

Toptal GitHub Breach Exposes Critical Gaps in Open-Source Security

In a stark reminder of the increasing risk to software supply chains, freelance talent platform Toptal is the latest high-profile organization impacted by a compromise of a GitHub account that led to the deployment of malicious npm packages with the capability to wipe developer machines and steal passwords. The breach, first disclosed last week, has shocked the developer community and exposed serious flaws in repository security, disclosure practices, and package ecosystem hygiene.