Blog Tom Abai

The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - Tom Abai
Tom Abai

Tom Abai is a security researcher at Mend.io. He is passionate about finding and addressing security incidents in the software supply chain area. In his free time, he likes to play CTF's games and learn cool stuff regarding cybersecurity.
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - Solana Supply Chain Security Blog graphic

The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security

This post covers the attack flow, how it happened, and the importance of supply chain security.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - polyfill supply chain attack post

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - shrinking security debt with dependency management white paper

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - blog 2 1

Over 100 Malicious Packages Target Popular ML PyPi Libraries

Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - 5 Tools for Managing Dependency Updates

What is LDAP Injection? Types, Examples and How to Prevent It

Learn what LDAP Injection is, its types, examples, and how to prevent it. Secure your applications against LDAP attacks.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - theres a new stealer variant in town and its using electron to stay fully undetected

There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - unseen risks of open source dependencies case of an abandoned name e1685538190274

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

Mend.io research discovered a threat actor takeover of the name β€˜gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.

Read More
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security - blog 2 1

Deceptive β€˜Vibranced’ npm Package Discovered Masquerading as Popular β€˜Colors’ Package

Discover the threat of the 'Vibranced' npm package masquerading as 'Colors'. Learn about its stages of execution, obfuscation techniques.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β