Remove npm-library-supply-chain-attack
article thumbnail

A Popular npm Library Compromised in a Supply Chain Attack: What to Do

Aqua Security

In late October, a supply chain attack affected a popular npm library, ua-parser-js, which put many companies at risk of compromise. In this blog, we will describe the attack and outline a few ways that organizations can mitigate similar threats.

Trends 111
article thumbnail

Protestware on the rise: Why developers are sabotaging their own code

TechCrunch

If combating attacks and hijackings of legitimate software on open source registries like npm weren’t challenging enough, app makers are increasingly experiencing the consequences of software self-sabotage. Developer Azer Koçulu ran into a trademark dispute with messaging app Kik because his npm package was called “kik.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Learn how a novel attack vector in GitHub Actions allows attackers to distribute malware across repositories using a technique that exploits the actions dependency tree and puts countless open-source projects and internal repositories at risk.

Malware 144
article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

9 | Software supply chain security in the spotlight. government stresses software supply chain security. Developers got concrete guidance and specific recommendations for protecting their software supply chains via a 64-page document from the U.S. Software Supply Chain Best Practices ” (CNCF).

article thumbnail

Software supply chain: What it is and how to keep it secure

CircleCI

As shortages of consumer goods and rising prices caused by bottlenecks in international supply networks have become more common, the global supply chain and its vulnerabilities have been top of mind for many. What is the software supply chain? Examples of software supply chain attacks.

article thumbnail

Radar trends to watch: May 2022

O'Reilly Media - Ideas

Attacks are increasingly focused on decentralized finance (DeFi) platforms. Google has proposed Supply Chain Levels for Software Artifacts (SLSA) as a framework for ensuring the integrity of the software supply chain. A virtual art museum for NFTs is still under construction, but it exists, and you can visit it.

article thumbnail

Radar Trends to Watch: September 2022

O'Reilly Media - Ideas

is a deep learning library for JavaScript , designed to run in the browser and using the computer’s GPU (if available). It’s still early, and doesn’t yet support some important NPM packages. SHARPEXT is malware that installs a browser extension on Chrome or Edge that allows an attacker to read gmail. Programming.