Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.io·8h·
Discuss: Hacker News
Flag this post

This is the third episode in a series of articles about the most prevalent kind of software supply chain attacks: those that abuse a public registry of open-source software components. After analyzing in the previous episode “Anatomy of Malicious Packages: What Are the Trends?” how the bad actors inject malicious behavior into new or existing published components, we are ready to put on our firefighting jackets and examine how we can successfully block malicious software delivered this way, or alternatively, deal with a potentially serious cyber incident because we took the wrong approach.

Most secur…

Similar Posts

Loading similar posts...