Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Enhancing Security with Build Application Firewalls

Enhancing Security with Build Application Firewalls

Posted on May 11, 2026 By CWS

Supply chain vulnerabilities have increasingly become a significant concern within the software industry, often originating during the continuous integration and continuous deployment (CI/CD) stages. Build application firewalls (BAFs) are emerging as a critical solution to address these issues and secure the application development process.

Understanding Supply Chain Threats

The 2020 SolarWinds breach, which impacted approximately 18,000 organizations, highlighted the severe risks associated with supply chain attacks. This incident underscored a vulnerability in the development cycle of widely used tools. Despite this wake-up call, similar attacks continue to occur, indicating the ongoing challenge of securing the supply chain.

In March 2026, North Korean attackers targeted the Axios npm library by hijacking a maintainer’s account, subsequently releasing two malicious versions. Given Axios’s widespread use and the automated nature of its implementation, approximately 3% of users inadvertently downloaded these harmful versions, leading to the deployment of a remote access trojan through CI/CD systems.

Recent Incidents and Vulnerabilities

Simultaneously, other attacks in early 2026 targeted Aqua’s Trivy vulnerability scanner, BerriAI’s LiteLLM, and Checkmarx/kics, aiming to infiltrate the CI/CD processes of these popular tools. As an example, Mercor reported being among the thousands affected by a LiteLLM-related supply chain attack. Additionally, the European Commission suffered a loss of 300Gb of data due to an API key compromised in the Trivy incident.

These incidents emphasize the risks of integrating malicious code into CI/CD systems. Developers often unknowingly incorporate flawed or dangerous packages, as build systems automatically pull from repositories like npm or PyPI. This can include malicious versions, typo-squatted dependencies, or compromised packages.

The Role of Build Application Firewalls

Traditional scanners aim to inspect code during and after the build process, but they may fail to detect all threats. This can be due to either the deceptive appearance of malicious actions, such as unauthorized posts to GitHub, or due to unknown zero-day vulnerabilities that standard tools cannot identify.

David Pulaski, co-founder of InvisiRisk, suggests that rather than relying solely on scanning, each package entering the build process should undergo thorough inspection. InvisiRisk has developed a BAF for CI/CD environments that operates like a security guard, meticulously monitoring internal activities to prevent malicious actions.

Unlike hardened runners that only observe DNS traffic, a BAF performs deep packet inspection, identifying security breaches at a granular level. This proactive approach enables the detection of unexpected activities, thereby mitigating potential threats.

Advancements in Software Bill of Materials (SBOM)

BAFs also play a role in enhancing the quality and accuracy of Software Bill of Materials (SBOMs), which are crucial for software transparency and compliance. InvisiRisk’s TruSBOM tool guarantees comprehensive and accurate SBOMs by directly observing the software construction process, ensuring that the provenance and dependencies of all components are accurately documented and verified.

The global push for SBOMs, bolstered by regulations such as Biden’s Executive Order 14028, aims to mitigate supply chain issues by offering clearer visibility into software components. However, achieving high-quality SBOMs remains a challenge, one that InvisiRisk’s solution seeks to address by providing detailed insights into software composition and preventing unauthorized data movements.

In conclusion, as supply chain attacks continue to rise, implementing build application firewalls can significantly bolster software security by preventing the introduction of harmful code during the development process and ensuring the integrity of SBOMs.

Security Week News Tags:AI vulnerabilities, build application firewalls, CI/CD security, Cybersecurity, deep packet inspection, Firewalls, hardened runners, InvisiRisk, npm libraries, PyPI, SBOM, software development, Software Security, supply chain attacks, TruSBOM

Post navigation

Previous Post: ShinyHunters Breaches Canvas LMS via Free Accounts

Related Posts

Strapi Ecosystem Hit by Malicious NPM Package Attack Strapi Ecosystem Hit by Malicious NPM Package Attack Security Week News
Imunify360 Vulnerability Could Expose Millions of Sites to Hacking Imunify360 Vulnerability Could Expose Millions of Sites to Hacking Security Week News
React2Shell Attacks Linked to North Korean Hackers React2Shell Attacks Linked to North Korean Hackers Security Week News
CloudSEK Raises  Million for Threat Intelligence Platform CloudSEK Raises $19 Million for Threat Intelligence Platform Security Week News
Cisco Patches 35 Vulnerabilities Across Several Products Cisco Patches 35 Vulnerabilities Across Several Products Security Week News
Auto Parts Giant LKQ Confirms Oracle EBS Breach Auto Parts Giant LKQ Confirms Oracle EBS Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark