Categories cyber attacks Data Breach impersonation attacks VAPT What is RepoJacking and How Organizations are Vulnerable to It? June 27, 2023June 28, 2023 5 mins read Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as RepoJacking. RepoJacking involves a malicious actor intentionally taking over the…