Cybersecurity
impact 20
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Why it matters
This signals a broader shift in poisoned. The real question is whether ruby moves the needle for practitioners.