
Malicious code on GitHub: How hackers target programmers
We discovered over 200 repositories with fake projects on GitHub. Using them, attackers distribute stealers, clippers, and backdoors.
9 articles
We discovered over 200 repositories with fake projects on GitHub. Using them, attackers distribute stealers, clippers, and backdoors.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
We take an in-depth look at securing and configuring containerization systems.
Open-source applications require proper implementation and maintenance; otherwise a company could face many threats. We highlight the key risks.
Business is actively moving over to open-source solutions. How can the transition be made successfully, and what are the risks to consider?
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
A supply-chain attack against Copay cryptowallets through an open-source library enables bitcoin theft.
Notifications