Accessibility Statement Skip Navigation
  • Back to Global Sites
  • +972-77-2005042
  • Blog
  • Journalists
  • GDPR
  • Send a Release
PR Newswire: news distribution, targeting and monitoring
  • News
  • Products
  • Contact
  • Hamburger menu
  • PR Newswire: news distribution, targeting and monitoring
  • Send a Release
    • Telephone

    • +972-77-2005042 from 8 AM - 11 PM IL

    • Contact
    • Contact

      +972-77-2005042
      from 8 AM - 11 PM IL

  • Request More Information
  • Journalists
  • GDPR
  • Request More Information
  • Journalists
  • GDPR
  • Request More Information
  • Journalists
  • GDPR
  • Request More Information
  • Journalists
  • GDPR

OX Security research: When an organization is at risk for dependency confusion attacks, 73% of its assets are vulnerable


News provided by

Ox Security

09 Aug, 2023, 17:07 IDT

Share this article

Share toX

Share this article

Share toX

The research, which looked at over 54,000 repositories across numerous sectors and organizations of various sizes, also revealed that the number of users does not indicate better security

TEL AVIV, Israel and BOSTON, Aug. 9, 2023 /PRNewswire/ -- New research from OX Security has found that almost all applications with more than 1B users are currently using dependencies which are vulnerable to dependency confusion attacks. Moreover, for organizations at risk, 73% of their assets are exposed to dependency confusion attacks, shedding new light on the devastating impact this type of attack can have on an organization.

The research, which looked at over 54,000 repositories, focused on both midsize and large organizations (1k+, 8k+, 80k+ employees) across a wide range of sectors, including finance, gaming, technology, and media. Risk of dependency confusion attacks was found across all sectors and organization sizes examined. 

A dependency confusion attack is when malicious actors upload a software package with the same name as a legitimate one to a public package repository in order to trick developers into unknowingly using a malicious version of the software. This can lead to severe consequences, as developers unwittingly introduce vulnerable or malicious code into their projects, compromising their security and integrity.

Dependency confusion attacks are highly dangerous because they often bypass traditional security measures, making them difficult to detect and defend against. They can potentially affect a large number of users and organizations reliant on the compromised dependencies, with one recent major example taking place in December 2022, when the PyTorch open source software supply chain was compromised.

Software companies are often particularly targeted for dependency confusion attacks because while the company thinks a package name is safe in a private registry, hijackers can still find the package name on package hosting services, public script files, and leaked internal paths.

"These findings of our latest research are deeply disturbing, as these types of attacks not only compromise the integrity and security of organizational assets, but they potentially impact those organizations' employees and users globally. Moreover, the fact that when an organization is at risk, a staggering 73% of their assets are vulnerable, really sheds light on just how exposed many organizations regardless of size or industry really are," said OX Security CEO and Co-Founder Neatsun Ziv.

ABOUT OX SECURITY

 At OX Security, we believe that security should be an integral part of the software development process, not an afterthought. Founded by Neatsun Ziv and Lion Arzi, two former Check Point executives, OX Security is the first and only platform to scan the entire software supply chain - from code to cloud to code - eliminating any blind spots and delivering complete visibility, context, prioritization of security issues. All this from a single pane of glass. Through a combination of best practices from risk management and cybersecurity and a developer-centric user experience, OX makes software supply chain security processes effortless for security teams to manage and easy for developers to adopt.

For more information visit www.ox.security and follow OX Security on LinkedIn.

SOURCE Ox Security

Modal title

Also from this source

OX Report: AI-Generated Code Violates Engineering Best Practices, Undermining Software Security at Scale

OX Report: AI-Generated Code Violates Engineering Best Practices, Undermining Software Security at Scale

OX Security today released a comprehensive research report revealing that AI coding tools are creating an "Army of Juniors" effect in software...

OX Launches VibeSec to Prevent Vibe Code Vulnerabilities From Ever Being Generated

OX Launches VibeSec to Prevent Vibe Code Vulnerabilities From Ever Being Generated

OX, a leader in Application Security, today announced VibeSec, the first platform built to stop insecure AI-generated code before it ever exists....

More Releases From This Source

Explore

High Tech Security

High Tech Security

Computer & Electronics

Computer & Electronics

Computer Software

Computer Software

Computer Software

Computer Software

News Releases in Similar Topics

Contact PR Newswire

  • +972-77-2005042
    from 8 AM - 11 PM IL

Global Sites

  • APAC
  • APAC - Traditional Chinese
  • Asia
  • Brazil
  • Canada
  • Czech
  • Denmark
  • Finland
  • France
  • Germany

 

  • India
  • Indonesia
  • Israel
  • Italy
  • Mexico
  • Middle East
  • Middle East - Arabic
  • Netherlands
  • Norway
  • Poland

 

  • Portugal
  • Russia
  • Slovakia
  • Spain
  • Sweden
  • United Kingdom
  • United States

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921
Global Sites
  • Asia
  • Brazil
  • Canada
  • Csezh
  • Denmark
  • Finland
  • France
  • Germany
  • India
  • Israel
  • Italie
  • Mexico
  • Middle East
  • Netherlands
  • Norway
  • Poland
  • Portugal
  • Russia
  • Slovakia
  • Spain
  • Sweden
  • United Kingdom
  • United States
+972-77-2005042
from 8 AM - 11 PM IL
  • Terms of Use
  • Privacy Policy
  • Information Security Policy
  • Site Map
  • Cookie Settings
Copyright © 2025 Cision US Inc.