Here are 2 posts matching this topic...
The Anatomy of a Malicious Package (Part 2)
Picking up where we left off in the last article, it's time to start thinking about improving our situation.
The Anatomy of a Malicious Package
What does a malicious package actually look like in practice? We'll walk through some hypothetical exercises to see how malware generally works, and what sort of functions we might expect, from relatively simple and temporary, to complex.