Subscribe to our research

Keep up with the latest software supply chain attacks

Devious Python Build Requirements

Build requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use....

Python Trojan Functions and Imports

Learn basic techniques attackers use to create malicious packages with trojan features found in attacks including typosquatting, starjacking, dependency confusion, and lockfile injection....

Python Package Spoofing

Find out how easy it is for threat actors to spoof legitimate Python packages as the foundation of their attacks on the software supply chain....