
What is RepoJacking and How Organizations are Vulnerable to It?
Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as RepoJacking. RepoJacking involves a malicious actor intentionally taking over the account of an owner or maintainer who hosts a repository. By gaining access to the account, the attacker can inject ... Read More

Cyber Attack Due to Malicious Open-source Package
Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the amount of work required to build complex systems. However, this convenience comes at a cost. Open-source packages can be compromised ... Read More
Protect future threats with Threat modeling
Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or computer system. It involves adopting the perspective impact on an application or computer system. It involves adopting the perspective of a malicious hacker to anticipate the possible damage they could ... Read More

An Overview of 3CX Supply Chain Attack
Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was delivered to millions of their customers through software updates, which also leads to massive cyber attacks. In this blog we will see how this supply chain attack happened, and how ... Read More