The threat actors infiltrated legitimate npm packages for SAP, Lightning, and Intercom to deploy credential-harvesting code, compromising over 1,800 developers.
Sign in to your account
Remember me