You are here |
adnanthekhan.com | ||
| | | |
www.haukeluebbers.de
|
|
| | | | Motivation Since the summer of 2019 I have been looking into package dependency compromises, a subset of software supply chain attacks. Today a number of popular programming languages make heavy use of more or less centralized package repositories and come with tools that make it easy to rely on third-party packages, which often come with lots of dependencies of their own. But with each dependency the attack surface for package dependency compromises increases - and malicious actors have already used dif... | |
| | | |
snyk.io
|
|
| | | | On the 29th of March 2024, the high-stakes investment and prolonged campaign to plant a backdoor in the Linux software library liblzma to gain access to multiple operating systems via Linux distributions was carried out by a malicious actor. | |
| | | |
blog.talosintelligence.com
|
|
| | | | ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. | |
| | | |
www.syntasso.io
|
|
| | An IDP is a self-service system with a centralised interface or entry point called an internal developer portal- which is also sometimes referred to as IDP. Through this portal, developers gain access to a pool of tools and resources needed to build, test, and deploy software. |