What is RepoJacking and How Organizations are Vulnerable to It?

What is RepoJacking and How Organizations are Vulnerable to It?

Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as RepoJacking. RepoJacking involves a malicious actor intentionally taking over the account of an owner or maintainer who hosts a repository. By gaining access to the account, the attacker can inject ... Read More
Cyber Attack Due to Malicious Open-source Package

Cyber Attack Due to Malicious Open-source Package

Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the amount of work required to build complex systems. However, this convenience comes at a cost. Open-source packages can be compromised ... Read More

Protect future threats with Threat modeling

Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or computer system. It involves adopting the perspective impact on an application or computer system. It involves adopting the perspective of a malicious hacker to anticipate the possible damage they could ... Read More
An Overview of 3CX Supply Chain Attack

An Overview of 3CX Supply Chain Attack

| | cyber attacks
Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was delivered to millions of their customers through software updates, which also leads to massive cyber attacks. In this blog we will see how this supply chain attack happened, and how ... Read More