Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychain
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.
Alan West
Alan West
Alan West
Follow
Mar 31
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.
#
security
#
npm
#
supplychain
#
javascript
Comments
Add Comment
4 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 31
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise
#
python
#
security
#
dependencies
#
supplychain
Comments
Add Comment
10 min read
LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.
Rotifer Protocol
Rotifer Protocol
Rotifer Protocol
Follow
Mar 31
LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.
#
security
#
webassembly
#
ai
#
supplychain
1
 reaction
Comments
Add Comment
6 min read
Building a Transdermal Patch Supply Chain Integration: A Technical Overview for Health-Tech Developers
KONGDY Health
KONGDY Health
KONGDY Health
Follow
Mar 31
Building a Transdermal Patch Supply Chain Integration: A Technical Overview for Health-Tech Developers
#
healthtech
#
supplychain
#
manufacturing
#
transdermalpatches
Comments
Add Comment
3 min read
Your package was compromised. How do you prove which version you actually shipped?
Jonna Fassbender
Jonna Fassbender
Jonna Fassbender
Follow
Mar 30
Your package was compromised. How do you prove which version you actually shipped?
#
security
#
supplychain
#
python
#
devops
Comments
Add Comment
3 min read
Axios was compromised for 3 hours - how to find it in your running Kubernetes clusters
TooFastTooCurious
TooFastTooCurious
TooFastTooCurious
Follow
Mar 31
Axios was compromised for 3 hours - how to find it in your running Kubernetes clusters
#
security
#
kubernetes
#
npm
#
supplychain
Comments
Add Comment
5 min read
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.
Nick Stocks
Nick Stocks
Nick Stocks
Follow
Mar 29
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.
#
security
#
supplychain
#
cve
#
aiinfrastructure
Comments
Add Comment
8 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
#
cybersecurity
#
steganography
#
supplychain
#
malware
Comments
Add Comment
7 min read
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects
Blake Donovan
Blake Donovan
Blake Donovan
Follow
Mar 28
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects
#
security
#
python
#
supplychain
#
devops
Comments
Add Comment
5 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
Pooya Golchian
Pooya Golchian
Pooya Golchian
Follow
Mar 27
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
#
security
#
supplychain
#
malware
#
developertools
Comments
Add Comment
5 min read
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.
Nick Stocks
Nick Stocks
Nick Stocks
Follow
Mar 27
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.
#
security
#
supplychain
#
cve
#
aiinfrastructure
Comments
Add Comment
5 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 26
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity
#
python
#
security
#
supplychain
#
dependencies
Comments
Add Comment
12 min read
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)
0xAllenDev
0xAllenDev
0xAllenDev
Follow
Mar 26
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)
#
python
#
security
#
supplychain
#
opensource
Comments
Add Comment
1 min read
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows
Pedro Savelis
Pedro Savelis
Pedro Savelis
Follow
Mar 26
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows
#
dlt
#
typescript
#
blockchain
#
supplychain
Comments
Add Comment
3 min read
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects
Arkaprabha Banerjee
Arkaprabha Banerjee
Arkaprabha Banerjee
Follow
Mar 25
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects
#
security
#
artificialintelligen
#
python
#
supplychain
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account