
web.archive.org/web/20240711163625/https:/checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure
Preview meta tags from the web.archive.org website.
Linked Hostnames
1Thumbnail

Search Engine Appearance
https://web.archive.org/web/20240711163625/https:/checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure
Attack on Software Supply Chains Using Fake Python Infrastructure
Checkmarx uncovered an attack on software supply chains, using tactics like stolen cookies and malicious code in PyPi packages. Learn how they did it
Bing
Attack on Software Supply Chains Using Fake Python Infrastructure
https://web.archive.org/web/20240711163625/https:/checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure
Checkmarx uncovered an attack on software supply chains, using tactics like stolen cookies and malicious code in PyPi packages. Learn how they did it
DuckDuckGo

Attack on Software Supply Chains Using Fake Python Infrastructure
Checkmarx uncovered an attack on software supply chains, using tactics like stolen cookies and malicious code in PyPi packages. Learn how they did it
General Meta Tags
13- titleAttack on Software Supply Chains Using Fake Python Infrastructure
- Content-typetext/html; charset=UTF-8
- X-UA-CompatibleIE=Edge
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1.0, minimum-scale=1.0, maximum-scale=1.0, user-scalable=no
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleAttack on Software Supply Chains Using Fake Python Infrastructure
- og:descriptionCheckmarx uncovered an attack on software supply chains, using tactics like stolen cookies and malicious code in PyPi packages. Learn how they did it
- og:urlhttps://web.archive.org/web/20240715170740/https://checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure/
Twitter Meta Tags
7- twitter:cardsummary_large_image
- twitter:creator@checkmarx
- twitter:site@checkmarx
- twitter:label1Written by
- twitter:data1Checkmarx Security Research Team
Link Tags
63- apple-touch-iconhttps://web.archive.org/web/20240715170740im_/https://checkmarx.com/wp-content/uploads/2024/06/cropped-cx_favicon-180x180.webp
- canonicalhttps://web.archive.org/web/20240715170740/https://checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure/
- iconhttps://web.archive.org/web/20240715170740im_/https://checkmarx.com/wp-content/uploads/2024/06/cropped-cx_favicon-32x32.webp
- iconhttps://web.archive.org/web/20240715170740im_/https://checkmarx.com/wp-content/uploads/2024/06/cropped-cx_favicon-192x192.webp
- pingbackhttps://checkmarx.com/xmlrpc.php
Links
77- https://web.archive.org/web/20240715170740/http://top.gg
- https://web.archive.org/web/20240715170740/https://checkmarx.com
- https://web.archive.org/web/20240715170740/https://checkmarx.com/about-checkmarx/#customers
- https://web.archive.org/web/20240715170740/https://checkmarx.com/about-checkmarx/#who-we-are
- https://web.archive.org/web/20240715170740/https://checkmarx.com/apma-appsec-maturity-methodology-assessment