<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Supply-Chain-Security on Shaharia Azam&#39;s Website | DevOps, Platform Engineering &amp; AI Insights</title>
    <link>https://shaharia.com/tags/supply-chain-security/</link>
    <description>Recent content in Supply-Chain-Security on Shaharia Azam&#39;s Website | DevOps, Platform Engineering &amp; AI Insights</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://shaharia.com/tags/supply-chain-security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How to Protect Against Software Supply Chain Attacks: A 2026 Engineer&#39;s Playbook</title>
      <link>https://shaharia.com/blog/protect-software-supply-chain-attacks-2026/</link>
      <pubDate>Sun, 17 May 2026 00:00:00 +0000</pubDate>
      <guid>https://shaharia.com/blog/protect-software-supply-chain-attacks-2026/</guid>
      <description>In May 2026, a compromised version of the popular TanStack npm package was used to breach two OpenAI employee laptops and reach internal source code. A few days earlier, a malicious release of PyTorch Lightning on PyPI was exfiltrating browser cookies, environment files, and cloud credentials from machine learning engineers. Two months before that, LiteLLM shipped a poisoned PyPI build that hit hundreds of thousands of developer machines.&#xA;These are not edge cases.</description>
    </item>
  </channel>
</rss>
