Account Takeover
Debunking Security for Developers (Part 1)
A primer for developers on commonly used buzz words in security.


- Date
- Reading time
- · 9 min

Attack vector
See all articlesSpam-pm: Investigating the Spam Invasion of npm
A deep dive into escalating spam problem on npm, and exploring the registry's unwanted guests.

- Date
- Reading time
- · 7 min

From Confusion to Compromise: Dependency Confusion Attacks
A primer on dependency confusion attacks
By · 4 min Read moreBeyond Known CVEs: Understanding Supply Chain Attacks
A post explaining key differences between two cybersecurity threats: known vulerabilities and supply chain attacks.
By and · 4 min Read more
Dependency Confusion
From Confusion to Compromise: Dependency Confusion Attacks
A primer on dependency confusion attacks

- Date
- Reading time
- · 4 min

Domain takeover
All your domains are belong to us
Let's discuss one of the most underrated but effective attack vectors: using expiring domains to take over npm packages.

- Date
- Reading time
- · 10 min

npm
See all articlesThe worst fear of a JavaScript developer
A discussion on the risks of transitive dependencies in JavaScript.


- Date
- Reading time
- · 7 min

Spam-pm: Investigating the Spam Invasion of npm
A deep dive into escalating spam problem on npm, and exploring the registry's unwanted guests.
By · 7 min Read moreFrom Confusion to Compromise: Dependency Confusion Attacks
A primer on dependency confusion attacks
By · 4 min Read more
Phishing
Spam-pm: Investigating the Spam Invasion of npm
A deep dive into escalating spam problem on npm, and exploring the registry's unwanted guests.

- Date
- Reading time
- · 7 min

Security for Developers
Beyond Known CVEs: Understanding Supply Chain Attacks
A post explaining key differences between two cybersecurity threats: known vulerabilities and supply chain attacks.


- Date
- Reading time
- · 4 min

spam
Spam-pm: Investigating the Spam Invasion of npm
A deep dive into escalating spam problem on npm, and exploring the registry's unwanted guests.

- Date
- Reading time
- · 7 min

Transitive dependencies
See all articlesFrom Confusion to Compromise: Dependency Confusion Attacks
A primer on dependency confusion attacks

- Date
- Reading time
- · 4 min
