#malicious-packages

[ follow ]
#software-supply-chain
Information security
fromTechzine Global
1 month ago

AI is making the software supply chain more perilous than ever

The JFrog report highlights security risks in the software supply chain, detailing threats from vulnerabilities, malicious packages, exposed secrets, and human error.
fromTechzine Global
3 months ago
Information security

Veracode strengthens software security with acquisition of Phylum technology

Veracode enhances application security by acquiring Phylum's technology for real-time analysis of malicious packages, addressing rising supply chain attack costs.
Information security
fromTechzine Global
1 month ago

AI is making the software supply chain more perilous than ever

The JFrog report highlights security risks in the software supply chain, detailing threats from vulnerabilities, malicious packages, exposed secrets, and human error.
fromTechzine Global
3 months ago
Information security

Veracode strengthens software security with acquisition of Phylum technology

Veracode enhances application security by acquiring Phylum's technology for real-time analysis of malicious packages, addressing rising supply chain attack costs.
more#software-supply-chain
#cybersecurity
JavaScript
fromTechzine Global
5 months ago

Hackers abuse NPM code registries via Ethereum network

NPM registries are under attack from malicious packages leveraging typosquatting, targeting developers' systems.
287 malicious packages discovered affect prominent libraries.
Hackers utilize Ethereum smart contracts to obscure their true origins.
fromCyberScoop
6 months ago
Information security

Malicious packages in open-source repositories are surging

Malicious packages in open-source software have increased by over 150% in the past year.
JavaScript
fromTechzine Global
5 months ago

Hackers abuse NPM code registries via Ethereum network

NPM registries are under attack from malicious packages leveraging typosquatting, targeting developers' systems.
287 malicious packages discovered affect prominent libraries.
Hackers utilize Ethereum smart contracts to obscure their true origins.
fromCyberScoop
6 months ago
Information security

Malicious packages in open-source repositories are surging

Malicious packages in open-source software have increased by over 150% in the past year.
more#cybersecurity
Information security
fromThe Hacker News
7 months ago

Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to Developers

A new supply chain attack technique called Revival Hijack targets the PyPI registry, allowing attackers to exploit existing packages for malicious intent.
Loading...