What is RepoJacking and How Organizations are Vulnerable to It?

June 27, 2023 - 5 mins read

Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as…

Cyber Attack Due to Malicious Open-source Package

June 6, 2023 - 6 mins read

Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by…

Protect future threats with Threat modeling

May 30, 2023 - 3 mins read

Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or…

An Overview of 3CX Supply Chain Attack

May 9, 2023 - 7 mins read

Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was…