Devs flood npm with 15,000 packages to reward themselves with Tea 'tokens'

Devs flood npm with 15,000 packages to reward themselves with Tea ‘tokens’

We have repeatedly come across cases involving open source registries like npm and PyPI being flooded with thousands of packages in a short span of time. Typically, such surges in publishing activity ...
CVE-2023-50164: Another vulnerability in the widely used Apache Struts2 component

CVE-2023-50164: Another vulnerability in the widely used Apache Struts2 component

Yet another remote code execution vulnerability in Apache’s Struts2 Framework has been discovered - leaving many with strong feelings of Deja Vu. If you're a developer, it's not unreasonable to be concerned ...
Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack

Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack

Earlier today, Ledger, a maker of hardware wallets for storing crypto, announced that they had identified malicious software embedded in one of their open source packages called @ledgerhq/connect-kit. This package is widely ...

Pandora Malware On Android TV: Safeguard Yourself Today

Popular for media streaming, low-cost Android TV set-top boxes are facing a new threat: a form of the Mirai malware botnet, which has recently attacked millions of these devices. This Pandora malware ...

A Closer Look: Differentiating Software Vulnerabilities and Malware

In today’s interconnected digital world, vulnerabilities and malware in open source software pose significant threats to the security and integrity of your software supply chain. While these two terms may appear synonymous ...
Manage Open Source Risk With Improved Malware Detection

Manage Open Source Risk With Improved Malware Detection

Malware targeting developers is a major concern that the industry is struggling to catch up with. We know open source software supply chain attacks are a problem with an estimated 700% increase ...