Software Supply Chain Security
Security measures for software development and deployment processes.
-
Understanding Package Registry Flooding
Package registry flooding is a cyberattack where threat actors overwhelm software package repositories with fake entries to hide malicious content, erode trust, and create vulnerabilities in the software supply chain.…
·
·
3–4 minutes -
What is an npm Worm?
An npm worm is a self-propagating campaign that exploits the npm registry by distributing fake or deceptive software packages to flood the registry. These financially motivated campaigns often use automated…
·
·
3–4 minutes -
Hidden “Logic Bombs” Found in Popular Software Packages, Threatening Future Industrial Sabotage and Data Corruption
Security researchers have uncovered a new wave of ‘logic bombs’ hidden within commonly used software, designed to disrupt critical industrial systems and corrupt databases, posing significant challenges for detection and…
·
·
2–3 minutes



