Explore >> Select a destination


You are here

adnanthekhan.com
| | www.haukeluebbers.de
11.9 parsecs away

Travel
| | Motivation Since the summer of 2019 I have been looking into package dependency compromises, a subset of software supply chain attacks. Today a number of popular programming languages make heavy use of more or less centralized package repositories and come with tools that make it easy to rely on third-party packages, which often come with lots of dependencies of their own. But with each dependency the attack surface for package dependency compromises increases - and malicious actors have already used dif...
| | snyk.io
9.1 parsecs away

Travel
| | On the 29th of March 2024, the high-stakes investment and prolonged campaign to plant a backdoor in the Linux software library liblzma to gain access to multiple operating systems via Linux distributions was carried out by a malicious actor.
| | blog.talosintelligence.com
10.3 parsecs away

Travel
| | ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns.
| | www.syntasso.io
55.3 parsecs away

Travel
| An IDP is a self-service system with a centralised interface or entry point called an internal developer portal- which is also sometimes referred to as IDP. Through this portal, developers gain access to a pool of tools and resources needed to build, test, and deploy software.