Published: October 26, 2023 | Category: Threat Intelligence

Developers have become the new high-value targets. While we obsess over securing cloud perimeters and firewalls, threat actors are simply asking the package manager for permission—and too often, it says yes.

In the ever-evolving landscape of cybersecurity, supply chain attacks remain the “gift that keeps on giving” for threat actors. Just when we thought we had a handle on dependency confusion and typosquatting, a new vector emerges.

Opexx: Exploit

Published: October 26, 2023 | Category: Threat Intelligence

Developers have become the new high-value targets. While we obsess over securing cloud perimeters and firewalls, threat actors are simply asking the package manager for permission—and too often, it says yes. Opexx Exploit

In the ever-evolving landscape of cybersecurity, supply chain attacks remain the “gift that keeps on giving” for threat actors. Just when we thought we had a handle on dependency confusion and typosquatting, a new vector emerges. Published: October 26, 2023 | Category: Threat Intelligence