The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.
Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.
Discover the importance of dependency management in securing the software supply chain as regulations escalate.
Learn how to protect your code from malicious packages with these eight considerations. Stay ahead of supply chain security threats.
Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.
Discover the latest threat in town – a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.
Learn about the risks of brandjacking & how to overcome them with application security tools & practices. Protect your org from cyber threats.
Find out what typosquatting is, why it is such a threat, and what you can do to stop it.
Learn how SLSA enhances software supply chain security with levels of protection. Understand the risks, benefits, and best practices.
Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.
Discover what’s driving the adoption of SBOMs and what’s next for them in terms of malicious packages and supply chain security.
Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service’, a retired Ruby gem with two million+ downloads.
Learn about malicious packages, how they work, and the growing threat they pose to software supply chains.
Discover the threat of the ‘Vibranced’ npm package masquerading as ‘Colors’. Learn about its stages of execution, obfuscation techniques.
Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.