XZ Trojan highlights software supply chain risk posed by 'sock puppets'
There is no fool-proof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three key indicators.
Read More
Get the best of RL Blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.