Poisoned Python and PHP packages purloin passwords for AWS access

More supply chain trouble – this time with clear examples so you can learn how to spot this stuff yourself.
Want to know more about this topic or about us? Contact us!
More supply chain trouble – this time with clear examples so you can learn how to spot this stuff yourself.
by Paul Ducklin Earlier this week we wrote about a jailbreak hack against Apple’s newly introduced AirTag product. In that story, the researcher @ghidraninja was able to modify the firmware on the AirTag itself, despite the anti-tampering protection implemented by Apple’s own AirTag firmware programming. But this “attack” (if that . . . Read more