Comment by hofrogs
3 months ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
3 months ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
No comments yet
Contribute on Hacker News ↗