Forem

# supplychainsecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Supply chain security for dependencies
Cover image for Supply chain security for dependencies

Supply chain security for dependencies

Comments
3 min read
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
Cover image for Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

Comments
9 min read
Supermicro GPU Smuggling: What the Indictment Reveals

Supermicro GPU Smuggling: What the Indictment Reveals

Comments
7 min read
The Vulnerability Scanner That Became the Vulnerability
Cover image for The Vulnerability Scanner That Became the Vulnerability

The Vulnerability Scanner That Became the Vulnerability

1
Comments 2
2 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence

Agent.BTZ — how one USB stick rewrote modern cyber defence

1
Comments
2 min read
How to Detect and Recover From a Compromised Container Scanner
Cover image for How to Detect and Recover From a Compromised Container Scanner

How to Detect and Recover From a Compromised Container Scanner

Comments
5 min read
Should RubyGems/Bundler Have a Cooldown Feature?

Should RubyGems/Bundler Have a Cooldown Feature?

60
Comments 5
4 min read
18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

7
Comments
3 min read
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
Cover image for How “Clinejection” Turned an AI Bot into a Supply Chain Attack

How “Clinejection” Turned an AI Bot into a Supply Chain Attack

Comments
11 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

Comments
3 min read
How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware
Cover image for How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware

How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware

5
Comments
6 min read
Exploitability Isn’t the Answer. Breakability Is.
Cover image for Exploitability Isn’t the Answer. Breakability Is.

Exploitability Isn’t the Answer. Breakability Is.

Comments
5 min read
When browser extensions become live surveillance

When browser extensions become live surveillance

2
Comments 1
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.