|
You are here |
www.legitsecurity.com | ||
| | | | |
www.sysdig.com
|
|
| | | | | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself. | |
| | | | |
www.backslash.security
|
|
| | | | | A major npm supply-chain incident surfaced last week. Over 800 packages were poisoned, leading to more than 25,000 GitHub repositories being populated with stolen secrets. Projects linked to Zapier, ENS Domains, PostHog, and Postman were briefly affected. | |
| | | | |
www.sonatype.com
|
|
| | | | | Open source malware is on the rise. Learn how to detect threats, comply with federal mandates, and secure your software supply chain with proactive security measures. | |
| | | | |
www.sonatype.com
|
|
| | | Explore software composition analysis (SCA) and software bill of materials (SBOM) management and why both help fortify software projects against threats | ||