|
You are here |
www.sonatype.com | ||
| | | | |
www.legitsecurity.com
|
|
| | | | | Discover why software supply chain vulnerability protection is important and how to effectively safeguard your business. | |
| | | | |
blog.sonatype.com
|
|
| | | | | The 'pymafka' PyPI package is filled with trojans targeting Windows, macOS & Linux users and appears to typosquat the popular PyKafka. | |
| | | | |
blog.aquasec.com
|
|
| | | | | In the latest npm supply chain attack, a popular library was compromised, here are the explanation of the attack flow and mitigation recommendations | |
| | | | |
www.sonatype.com
|
|
| | | Learn about evolving malware threats, proactive defense strategies, and the role of software composition analysis to protect your development processes. | ||