Malicious package distribution from different sources
We have collected 28,593 specific blog posts from 24 intelligence sources. Each report includes the timestamp of collection, the source of intelligence, the publication time of the blog, and the URL of the blog page. To conduct LLM-based intelligence analysis, we further utilize crawlers to collect the web content of these blogs.