
¡ 10 min read
Malicious Compliance: How Trusted Packages Turn Into Attack Vectors
Modern software is built largely on open-source packages and libraries. Instead of developing everything from scratch, developers often rely on third-party...
Latest posts and updates from Niclas Hedam's blog, covering cyber security topics, insights, and personal reflections.

¡ 10 min read

¡ 9 min read

¡ 13 min read

¡ 10 min read

¡ 8 min read

¡ 9 min read