Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DEV Community

Stacklok

As malicious attacks grow more sophisticated with AI, new detection and prevention methods are crucial. Stacklok is developing innovative tools and approaches to counter supply chain attacks, working in alignment with open source communities

Location Everywhere Joined Joined on  Twitter logo GitHub logo External link icon
Support email

stacey@stacklok.com

Employees

37

LLM Basics: The Transformer Model

LLM Basics: The Transformer Model

4
Comments
6 min read
Introduction to Minder

Introduction to Minder

1
Comments
2 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

4
Comments
1 min read
Cross-platform RAT deployed by weaponized 'requests' clone

Cross-platform RAT deployed by weaponized 'requests' clone

8
Comments
4 min read
Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

5
Comments
4 min read
NPM packages leveraged for cryptocurrency theft

NPM packages leveraged for cryptocurrency theft

8
Comments
5 min read
North Korean State Actors Exploit Open Source Supply Chain via Malicious npm Package

North Korean State Actors Exploit Open Source Supply Chain via Malicious npm Package

12
Comments
8 min read
loading...