
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
A library to use serialized objects or types stored in files as a database (works as an small document-oriented database). very useful to use in applications that need to store data however your developers do not want to have the job of dealing with SQL even writing code for serialization of data in XML or JSON. Offers even functions such as: Insert, Delete, Update and also uses triggers for these same functions : after & Before Insert, After & before Update,After & Before Delete. also offers the use of primary keys and monitoring of them to prevent duplication of records .
FAQs
A library to use serialized objects or types stored in files as a database (works as an small document-oriented database). very useful to use in applications that need to store data however your developers do not want to have the job of dealing with SQL even writing code for serialization of data in XML or JSON. Offers even functions such as: Insert, Delete, Update and also uses triggers for these same functions : after & Before Insert, After & before Update,After & Before Delete. also offers the use of primary keys and monitoring of them to prevent duplication of records .
We found that nosqlitex demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.