The Phylum Threat Feed is a curated view of software supply chain attacks and malicious packages that have been published to open source ecosystems (e.g., npm, PyPI, RubyGems, etc.). The feed pulls data from Phylum's proprietary database and shows timely, high-signal threat feed data that informs organizations of software supply chain attacks as well as leading indicators of potential future threats. This high-fidelity data is actionable on its own and can be consumed by any any security analytics or observability product to enrich other findings.
Malware
Credential stealers
Typosquatting
Backdoors
Nation-State attacks
Phylum was the first to discover nation state actors attacking the software supply chain. This attack was surfaced on our threat feed days before it became public knowledge. Get automated, actionable threat data shortly after the packages are published.
Ingest the threat feed into any security analytics or observability tool
See high-fidelity threat data with minimal false positives
The threat feed is a JSON API. It provides you with the package name, version, ecosystem, hashes and other indicators of compromise (IOCs). This data can be queried and fed into other security products or data analysis tooling.
Want to dive deeper into the threat feed? Learn more in the Phylum docs.
See Phylum’s automated software supply chain attack threat data in Sumo Logic
The Phylum Threat Feed provides a curated view of malicious packages that are published into the open-source ecosystem. The feed shows timely, high signal threat data that informs organizations of software supply chain attacks that have executed as well as indicators of potential future threats.