Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.

​Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.