Explore >> Select a destination


You are here

www.legitsecurity.com
| | www.sysdig.com
2.6 parsecs away

Travel
| | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself.
| | www.backslash.security
2.6 parsecs away

Travel
| | A major npm supply-chain incident surfaced last week. Over 800 packages were poisoned, leading to more than 25,000 GitHub repositories being populated with stolen secrets. Projects linked to Zapier, ENS Domains, PostHog, and Postman were briefly affected.
| | www.sonatype.com
3.0 parsecs away

Travel
| | Open source malware is on the rise. Learn how to detect threats, comply with federal mandates, and secure your software supply chain with proactive security measures.
| | www.sonatype.com
11.9 parsecs away

Travel
| Explore software composition analysis (SCA) and software bill of materials (SBOM) management and why both help fortify software projects against threats