Metadata Analysis of flatmap dependency supply chain attack

Investigating future model detection mechanisms for open source project repositories

Post thumbnail
Post thumbnail
There’s been hundreds of software dependency supply chain attacks exploiting a range of vectors in the past, with great effect. The July 2020 paper by Marc Ohm et al describes that on average a malicious package is available for 209 days. (π‘šπ‘–π‘›=βˆ’1,π‘šπ‘Žπ‘₯=1,216,𝜎=258,π‘₯Μƒ =67) so naturally, any method to reduce this... [Read More]

The CEO of SolarWinds (and former CEO of Pulse Secure) is clearly a victim of witchcraft.

Has there ever been such compelling evidence of the existence of magic?

Post thumbnail
Post thumbnail
Over the years I have conducted numerous physical and personal security assessments for businesses and executives. Part of that assessment has always included a sweep for hex bags and other physical curses. Using this knowledge, I must state that the CEO at the center of two of the most serious... [Read More]
Tags: humor test