top of page

InvisiRisk Blog Posts


Shai-Hulud Worm Reloaded: A New Wave of NPM Supply Chain Attacks and How InvisiRisk Stops It
Between November 21-23, the Shai-Hulud worm returned in a more aggressive form, rapidly spreading through the NPM ecosystem and Maven, compromising tens of thousands of repositories. InvisiRisk Build Application Firewall (BAF) includes a robust set of default security policies that enforce expected build behavior. The "Unauthorized PUT" policy serves as a critical defense against attacks like Shai-Hulud.
Pranesh Shrestha
9 minutes ago4 min read
Â
Â
Â


The 's1ngularity' Attack: Weaponizing AI CLI Tools and How InvisiRisk Stops It
The nx 's1ngularity' attack is a powerful reminder that supply chain security requires more than just scanning dependencies. InvisiRisk provides the proactive, real-time defense needed to secure the modern software development lifecycle.
Pranesh Shrestha
Oct 216 min read
Â
Â
Â


Shai-Hulud NPM Worm Attack: Overview and InvisiRisk Protection
InvisiRisk’s BAF enforces defensive rules in the build pipeline (trusted registries/SCM, blocked packages, secret-leak prevention, response checks, git protections), and the Build Security AI Agent feature provides behavioral detection for novel, suspected worm-style activities. The defensive rules and the agent work together to stop supply-chain worms and credential-theft campaigns from spreading through your builds.
Pranesh Shrestha
Sep 255 min read
Â
Â
Â


The Great NPM Heist – What Happened and How InvisiRisk Protects You
Integrating InvisiRisk Build Application Firewall into your development workflow is a practical way to ensure that even if attackers try to slip malware into NPM or Git, your build process will catch it and shut it down before any damage is done.
Pranesh Shrestha
Sep 196 min read
Â
Â
Â
bottom of page