|
You are here |
hardenedvault.net | ||
| | | | |
www.sysdig.com
|
|
| | | | | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself. | |
| | | | |
snyk.io
|
|
| | | | | On the 29th of March 2024, the high-stakes investment and prolonged campaign to plant a backdoor in the Linux software library liblzma to gain access to multiple operating systems via Linux distributions was carried out by a malicious actor. | |
| | | | |
kevingimbel.de
|
|
| | | | | A digital garden of sorts; always growing ?? | |
| | | | |
plerion.com
|
|
| | | There are more ways to configure cloud resources than we can count. Find the bad ones with Cloud Security Posture Management (CSPM). | ||