Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychain
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.
Nick Stocks
Nick Stocks
Nick Stocks
Follow
Mar 29
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.
#
security
#
supplychain
#
cve
#
aiinfrastructure
Comments
Add Comment
8 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
#
cybersecurity
#
steganography
#
supplychain
#
malware
Comments
Add Comment
7 min read
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects
Blake Donovan
Blake Donovan
Blake Donovan
Follow
Mar 28
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects
#
security
#
python
#
supplychain
#
devops
Comments
Add Comment
5 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
Pooya Golchian
Pooya Golchian
Pooya Golchian
Follow
Mar 27
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
#
security
#
supplychain
#
malware
#
developertools
Comments
Add Comment
5 min read
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.
Nick Stocks
Nick Stocks
Nick Stocks
Follow
Mar 27
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.
#
security
#
supplychain
#
cve
#
aiinfrastructure
Comments
Add Comment
5 min read
The Hardware of Fashion: Why the Supply Chain is just a Distributed System
ExploreTex® | Apparel Manufacturing Hub | Full-Pac
ExploreTex® | Apparel Manufacturing Hub | Full-Pac
ExploreTex® | Apparel Manufacturing Hub | Full-Pac
Follow
Mar 26
The Hardware of Fashion: Why the Supply Chain is just a Distributed System
#
supplychain
#
sustainability
#
productivity
#
startup
Comments
Add Comment
3 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 26
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity
#
python
#
security
#
supplychain
#
dependencies
Comments
Add Comment
12 min read
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)
0xAllenDev
0xAllenDev
0xAllenDev
Follow
Mar 26
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)
#
python
#
security
#
supplychain
#
opensource
Comments
Add Comment
1 min read
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows
Pedro Savelis
Pedro Savelis
Pedro Savelis
Follow
Mar 26
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows
#
dlt
#
typescript
#
blockchain
#
supplychain
Comments
Add Comment
3 min read
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects
Arkaprabha Banerjee
Arkaprabha Banerjee
Arkaprabha Banerjee
Follow
Mar 25
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects
#
security
#
artificialintelligen
#
python
#
supplychain
Comments
Add Comment
4 min read
When Your LLM Proxy Becomes the Attack Vector
Wu Long
Wu Long
Wu Long
Follow
Mar 24
When Your LLM Proxy Becomes the Attack Vector
#
security
#
ai
#
python
#
supplychain
Comments
Add Comment
3 min read
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics
Kalyan Tamarapalli
Kalyan Tamarapalli
Kalyan Tamarapalli
Follow
Mar 23
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics
#
security
#
cybersecurity
#
devops
#
supplychain
Comments
Add Comment
3 min read
Ataque Ă Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa
Gabriel Lima Ferreira
Gabriel Lima Ferreira
Gabriel Lima Ferreira
Follow
Mar 23
Ataque Ă Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa
#
supplychain
#
npm
#
devsecops
#
sca
Comments
Add Comment
2 min read
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 22
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed
#
security
#
github
#
ai
#
supplychain
Comments
Add Comment
14 min read
Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds
Scott Sage
Scott Sage
Scott Sage
Follow
Mar 22
Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds
#
mcp
#
ai
#
supplychain
#
opensource
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account