How to detect and prevent Contagious Interview IDE attacks
Learn how we built custom controls that detect and prevent malware campaigns like those used for Contagious Interview and how to deploy them in your environment.
Read PostLearn about cybersecurity trends, best practices, and third-party threats to secure your code and digital infrastructure.

Learn how we built custom controls that detect and prevent malware campaigns like those used for Contagious Interview and how to deploy them in your environment.
Read Post
Learn how GitLab's Signals Engineering team built the WATCH framework to continuously validate our security monitoring pipeline.

Learn how centralized pipeline policies can detect and block the patterns behind a series of recent attacks.

Learn how GitLab's Signals Engineering team uses our AI platform to automatically surface detection gaps from security incidents — no manual review required.

GitLab's Security Compliance team created a custom control framework to scale across multiple certifications and products — here's why and how you can, too.

Gain threat intelligence about North Korea’s Contagious Interview and fake IT worker campaigns and learn how GitLab disrupted their operations.

Malware driving attack includes "dead man's switch" that can harm user data.

Learn how GitLab's Security Compliance team improved observation management using the DevSecOps platform, enhancing visibility, collaboration, and accountability.