Skip to content tj-actions/changed-files, corrupted to run credential-stealing memory scraper. Open-source software used by more than 23,000 organizations, some of […]
Category: supply chain attack
Go Module Mirror served backdoor to devs for 3+ years
A mirror proxy Google runs on behalf of developers of the Go programming language pushed a backdoored package for more […]