Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks
-
Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground for massive supply chain attacks.
We *never* had these kinds of problems with DOS batch files
-
Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground for massive supply chain attacks.
We *never* had these kinds of problems with DOS batch files
I'll bet Microsoft tests its internal LOB applications more than what they feed us.
The difficult we do right away... ...the impossible takes slightly longer.
-
I'll bet Microsoft tests its internal LOB applications more than what they feed us.
The difficult we do right away... ...the impossible takes slightly longer.
I would not be something really important... just in case
M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.