The Second Coming of Shai-Hulud: npm Targeted Yet Again
TL;DR This is the second time a malicious campaign - codenamed Shai‑Hulud - has been detected targeting the npm ecosystem....
TL;DR This is the second time a malicious campaign - codenamed Shai‑Hulud - has been detected targeting the npm ecosystem....
The OWASP Top 10 2025 release candidate is here, marking an important milestone in the evolution of application security best...
In Part 1 of this blog series, we learned about GitHub Actions and their risks—now comes the fun part. It’s...
Why do attackers love GitHub Actions, and why should you care? The answer lies in a dangerous combination of widespread...
This week, three new high-severity vulnerabilities were revealed in runC, the fundamental runtime technology used by most container platforms. This...
On October 23rd, Microsoft released an unusual out-of-band security patch for CVE-2025-59287, a remote code execution vulnerability in WSUS (Windows...
Few threats capture the complexity of today’s digital ecosystem quite like supply chain attacks. These incidents don’t just exploit technical...
Executive summary We have managed to successfully compromise repositories owned by Microsoft, Google, Nvidia and many more using a single...
Executive Summary: The Orca Research Pod has uncovered critical security risks across several high-profile open source repositories that relied on...