Information security
fromThe Hacker News
5 days agoPoisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.