Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
20 Days Later: Trivy Compromise, Act II (boostsecurity.io)
3 points by slim 2 days ago | past | 1 comment
Unveiling Bagel: Why Your Developer's Laptop Is the Softest Target (boostsecurity.io)
1 point by gepeto42 38 days ago | past
Weaponizing Dependabot: Pwn Request at its finest (boostsecurity.io)
111 points by chha 9 months ago | past | 58 comments
Weaponizing Dependabot: Pwn Request at its finest (boostsecurity.io)
4 points by gepeto42 9 months ago | past | 1 comment
Opening Pandora's Box – Supply Chain Insider Threats in Open Source Projects (boostsecurity.io)
5 points by gepeto42 on March 15, 2024 | past | 3 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: