SANS Digital Forensics and Incident Response and CrowdStrike describe developer-targeted operations that start with a job interview or coding task and lead to compromise, often via malicious open source packages and malware-free execution paths.
Hunting North Korea’s State-Sponsored “Contagious Interview” Operation
Attacks on Developers via the Software Supply Chain
Can an Attack Start Without Malware? 82% of Attacks Do.
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security