Diamond Member ThaHaka 0 Posted September 4 Diamond Member Share Posted September 4 This is the hidden content, please Sign In or Sign Up A new supply chain ******* technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in an attempt to infiltrate downstream organizations. It has been codenamed Revival ******* by software supply chain security firm JFrog, which said the ******* method could be used to ******* 22,000 existing PyPI packages and result in "hundreds of thousands" of malicious package This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/117849-h4ckn3wshackers-hijack-22000-removed-pypi-packages-spreading-malicious-code-to-developers/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now