DEV Community

# supplychain

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

Comments
4 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Comments
10 min read
LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.

LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.

1
Comments
6 min read
Building a Transdermal Patch Supply Chain Integration: A Technical Overview for Health-Tech Developers

Building a Transdermal Patch Supply Chain Integration: A Technical Overview for Health-Tech Developers

Comments
3 min read
Your package was compromised. How do you prove which version you actually shipped?

Your package was compromised. How do you prove which version you actually shipped?

Comments
3 min read
Axios was compromised for 3 hours - how to find it in your running Kubernetes clusters

Axios was compromised for 3 hours - how to find it in your running Kubernetes clusters

Comments
5 min read
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.

One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.

Comments
8 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Comments
7 min read
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects

Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects

Comments
5 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Comments
5 min read
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.

LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.

Comments
5 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Comments
12 min read
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

Comments
1 min read
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows

Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows

Comments
3 min read
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects

LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.