DEV Community

# supplychain

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.

One Stolen Token. Five Ecosystems. The TeamPCP Supply Chain Attack Is Still Spreading.

Comments
8 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Comments
7 min read
Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects

Supply Chain Security: How the Telnyx PyPI Compromise Happened and How to Protect Your Projects

Comments
5 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Comments
5 min read
LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.

LiteLLM Was Backdoored via Its Security Scanner. Langflow Hit CISA's Exploit Catalog. Same Week.

Comments
5 min read
The Hardware of Fashion: Why the Supply Chain is just a Distributed System

The Hardware of Fashion: Why the Supply Chain is just a Distributed System

Comments
3 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Comments
12 min read
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

Comments
1 min read
Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows

Corda Flows in TypeScript: Real Enterprise Blockchain Patterns for Privacy, Compliance & Regulated Workflows

Comments
3 min read
LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects

LiteLLM 1.82.7 and 1.82.8: Critical Security Compromise Exposed – How to Protect Your AI Projects

Comments
4 min read
When Your LLM Proxy Becomes the Attack Vector

When Your LLM Proxy Becomes the Attack Vector

Comments
3 min read
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

Comments
3 min read
Ataque Ă  Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa

Ataque Ă  Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa

Comments
2 min read
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed

Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed

Comments
14 min read
Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds

Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.