Blog

Updates from our team
Cover Image for Hijacking npm Packages in Documentation
·4 mins reading

A comprehensive guide on hackers can hijack the installation instructions in your documentation leading to remote code execution and malware installation.

Cover Image for Remote Code Execution in ALEX via npm Dependency Confusion
·3 mins reading

A real-world example demonstrating how a hijacked npm scope can lead to remote code execution on the developer's computer.

Cover Image for Remote Code Execution in Illuvium via Gem Takeover
·2 mins reading

A real-world example demonstrating how a hijacked gem package can lead to remote code execution that affects users following installation instructions.

Cover Image for How SupplyShark Works
·2 mins reading

An overview of how we protect you from supply chain attacks.