Comment by hofrogs
5 days ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
5 days ago
That's usually what those security companies do, they monitor all those repositories and look for patterns, then investigate anything suspicious.
No comments yet
Contribute on Hacker News ↗