Comment by hofrogs
4 days ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
4 days ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
No comments yet
Contribute on Hacker News ↗