Join us

NPM flooding case-study: “Down the Rabbit Hole looking for a Tea”

NPM_Flooding

While the presence of malicious code in package registries is well-known, there are other strange or unusual behaviors that completely go unnoticed by the regular users of these registries. Even for those of us who keep a close watch on them, it is not easy to find a reason or explanation for such behavior. Read about it!


Only registered users can post comments. Please, login or signup.

Start blogging about your favorite technologies, reach more readers and earn rewards!

Join other developers and claim your FAUN account now!

Xygeni

Secure your Software Development and Delivery

Avatar

Maria Gomez

Paid Acquisition and Growth Marketing, xygeni

@mashka
Hello there! I am a marketer who is diving deep into Application Security!
User Popularity
10

Influence

1k

Total Hits

0

Posts