Insights and Resources

Subscribe to our research

Keep up with the latest software supply chain attacks

Python Trojan Functions and Imports

Learn basic techniques attackers use to create malicious packages with trojan features found in attacks including typosquatting, starjacking, dependency confusion, and lockfile injection....

Python Package Spoofing

Find out how easy it is for threat actors to spoof legitimate Python packages as the foundation of their attacks on the software supply chain....