{"id":2307,"date":"2024-10-14T12:12:45","date_gmt":"2024-10-14T12:12:45","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/14\/supply-chain-attacks-exploit-entry-points-in-python-npm-and-open-source-ecosystems\/"},"modified":"2024-10-14T12:12:45","modified_gmt":"2024-10-14T12:12:45","slug":"supply-chain-attacks-exploit-entry-points-in-python-npm-and-open-source-ecosystems","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/14\/supply-chain-attacks-exploit-entry-points-in-python-npm-and-open-source-ecosystems\/","title":{"rendered":"Supply Chain Attacks Exploit Entry Points in Python, npm, and Open-Source Ecosystems"},"content":{"rendered":"<p>\u200bCybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks.<br \/>\n&#8220;Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the open-source landscape,&#8221; Checkmarx researchers Yehuda\u00a0Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks.<br \/>\n&#8220;Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the open-source landscape,&#8221; Checkmarx researchers Yehuda\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks. &#8220;Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the open-source landscape,&#8221; Checkmarx&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/14\/supply-chain-attacks-exploit-entry-points-in-python-npm-and-open-source-ecosystems\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Supply Chain Attacks Exploit Entry Points in Python, npm, and Open-Source Ecosystems<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2308,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2307"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2307"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2307\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2308"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}