Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»Report: 96% of vulnerable open-source downloads are avoidable
Technology

Report: 96% of vulnerable open-source downloads are avoidable

November 26, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Report: 96% of vulnerable open-source downloads are avoidable
Share
Facebook Twitter LinkedIn Pinterest Email

Try the on-demand periods from the Low-Code/No-Code Summit to discover ways to efficiently innovate and obtain effectivity by upskilling and scaling citizen builders. Watch now.


Because the trade’s reliance on open-source software program has elevated, so has the variety of identified software program provide chain assaults, with a 742% improve during the last three years, based on Sonatype’s eighth annual State of the Software program Provide Chain Report. 1.2 billion susceptible dependencies are downloaded every month, based on the report. Of those, 96% had a non-vulnerable possibility out there. Shopper habits, not open-source maintainers, are sometimes cited in public discussions because the trigger. 

One motive behind this pattern is the rise and evolution of software program provide chain assaults. The report reveals a 633% year-over-year improve in malicious assaults aimed toward open supply in public repositories – and a median 742% yearly improve in software program provide chain assaults since 2019. 

Picture supply: Sonatype.

Whereas cybercriminals are nothing new, the frequency, severity and class of those malicious assaults have gotten a significant subject plaguing builders and organizations around the globe. Builders are being requested to keep up a working information of software program high quality, a number of open-source ecosystems, fluctuating rules and virtually 1,500 dependency modifications per 12 months, per software – all within the face of continually-evolving assaults. 

So what will be completed? Minimizing dependencies and sustaining low replace occasions are important components for lowering the danger of transitive vulnerabilities — the most typical supply of safety danger. 

Occasion

Clever Safety Summit

Study the important position of AI & ML in cybersecurity and trade particular case research on December 8. Register on your free move at present.

Register Now

Curbing vulnerabilities is about greater than the safety of tasks, although: it impacts job satisfaction, too. In a survey of engineering professionals, people from organizations with increased ranges of software program provide chain maturity have been 2.7 occasions extra prone to strongly agree with the assertion, “I’m happy with my job.” 

Curiously, there’s a transparent disconnect between safety measures going down and what individuals in IT assume is occurring. Sixty-eight p.c of respondents have been assured their purposes should not utilizing susceptible libraries. Nonetheless, in a random scan of enterprise purposes, 68% had identified vulnerabilities of their open-source software program parts.

IT managers have been 2.4 occasions extra seemingly than respondents working in data safety to strongly agree with “We tackle remediation of safety points as a daily a part of growth work.” 

To innovate sooner and develop at scale, organizations have to make it as simple as doable for builders to create safe, maintainable software program, which incorporates giving them smarter instruments that present extra visibility into their programs and automate their processes. 

Sonatype’s eighth annual State of the Software program Provide Chain Report blends a broad set of public and proprietary knowledge and evaluation, together with 131 billion Maven Central downloads, survey outcomes from 662 engineering professionals, and the evaluation of 85,000 enterprise purposes. 

Learn the complete report from Sonatype.

Source link

avoidable downloads opensource report vulnerable
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Microsoft deepens ties with Anthropic, integrates Claude Cowork agentic AI tool with 365 Copilot | Technology News

March 10, 2026

Samsung Refutes S26 Ultra Privacy Display Complaints

March 10, 2026

Google Play Store Warning Over Battery-Draining Android Apps

March 10, 2026

Meta’s AI glasses face privacy lawsuit over human review of user footage: 5 things to know | Technology News

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Jose Mourinho hits back after red card in Benfica vs Porto 2-2 draw

March 10, 2026

Princesses Beatrice and Eugenie ‘Set to Freeze Out Sarah Ferguson’

March 10, 2026

Gold opens lower after oil prices spike

March 10, 2026

U.S. Stocks Erase A Big Early Loss And Rise After Oil Prices Whip From Nearly $120 Back Below $90

March 10, 2026
Popular Post

Majority of Japanese oppose raising taxes to fund military expansion: Report

DJT stock jumps after Trump clinches election win

Prince Harry Tracked Meghan Markle Online Before They Met

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2026 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.