Our Research

Hayden Smith

The following is a story about the recent XZ Utils security breach and how things came about. Formore context on the

Our Blog

Hunted Labs

The biggest software security risk often enters long before scanners or alerts are involved. The moment a dependency is chosen is the moment trust is assumed, and that decision shapes everything that follows.

Request A Demo

Fill out the form below so we can arrange a product demo for you.

    Request A Demo

    Fill out the form below so we can arrange a product demo for you.

    Thank You

    We have received your submission.