Tag: supply-chain
-
PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack
by
in SecurityNewsA sophisticated phishing campaign, dubbed >>PoisonSeed,
-
Malicious PyPI Package Targets E-commerce Sites with Automated Carding Script
by
in SecurityNewsCybersecurity researchers from Socket have exposed a malicious Python package on PyPI, named disgrasya, designed to automate credit card fraud on WooCommerce-based e-commerce sites. Unlike conventional supply chain attacks that rely on deception or typosquatting, disgrasya was overtly malicious, leveraging PyPI as a distribution platform to reach a broad audience of fraudsters. The package specifically…
-
SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
by
in SecurityNewsThe cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the “tj-actions/changed-files” GitHub Action has been traced further back to the theft of a personal access token (PAT) related to SpotBugs.”The attackers obtained initial access by taking advantage of the GitHub Actions workflow of SpotBugs, a popular…
-
Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise
by
in SecurityNewsThe threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo Alto Networks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/tj-actions-supply-chain-attack/
-
Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack
by
in SecurityNewsEvidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack. The post Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/compromised-spotbugs-token-led-to-github-actions-supply-chain-hack/
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Recent GitHub supply chain attack traced to leaked SpotBugs token
by
in SecurityNewsA cascading supply chain attack on GitHub that targeted Coinbase in March has now been traced back to a single token stolen from a SpotBugs workflow, which allowed a threat actor to compromise multiple GitHub projects. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/recent-github-supply-chain-attack-traced-to-leaked-spotbugs-token/
-
Cyber threats against software supply chain fueled by AI
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/cyber-threats-against-software-supply-chain-fueled-by-ai
-
Microsoft’s AI tool catches critical GRUB2, U-boot bootloader flaws
by
in SecurityNews
Tags: access, ai, control, cybersecurity, exploit, firmware, flaw, Hardware, microsoft, mitigation, monitoring, risk, soc, supply-chain, tool, update, vulnerability, vulnerability-management, zero-dayAI-powered discovery changes the cybersecurity landscape: Microsoft’s Security Copilot tool significantly accelerated the vulnerability identification process, with a particular focus on filesystem implementations due to their high vulnerability potential.”Using Security Copilot, we were able to identify potential security issues in bootloader functionalities, focusing on filesystems due to their high vulnerability potential,” the blog stated. “This…
-
Oracle Health warnt vor Datenleck
by
in SecurityNews
Tags: access, ceo, cloud, computer, cyberattack, cybersecurity, cyersecurity, data-breach, hacker, Internet, login, oracle, password, supply-chain, usaHacker haben sich Zugriff auf Daten von Oracle Health verschafft.Während Oracle den Datenverstoß, der in der vergangenen Woche ans Licht kam, öffentlich abstreitet, informierte die Tochtergesellschaft Oracle Health kürzlich betroffene Kunden über ein Datenleck. Betroffen waren Daten von alten Datenmigrations-Server von Cerner, wie aus einem Bericht von Bleeping Computer hervorgeht. Oracle hatte den IT-Dienstleister für…
-
UK Government Previews Cybersecurity Legislation
by
in SecurityNewsGovernment Says Managed Service Providers Need More Regulation. The British government pledged to introduce stricter rules surrounding incident reporting and supply chain vulnerability patching through legislation it previewed in July 2024. The proposed Cyber Security and Resilience Bill will bring under its scope managed service providers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-government-previews-cybersecurity-legislation-a-27897
-
Altgeräte bedrohen Sicherheit in Unternehmen
by
in SecurityNews
Tags: access, apache, authentication, botnet, bug, cisco, cloud, cve, cyberattack, dns, endpoint, firewall, Hardware, intelligence, Internet, ivanti, lazarus, linux, macOS, network, open-source, password, radius, ransomware, risk, router, sans, service, software, supply-chain, threat, update, vulnerabilitySchwachstellen in alten Netzwerkgeräten stellen ein erhebliches Sicherheitsrisiko für Unternehmen dar.Eine Analyse von Ciscos Threat-Intelligence-Team Talos zeigt, zwei der drei häufigsten Schwachstellen, auf die es Angreifer im Jahr 2024 abgesehen hatten, waren in alten Netzwerkgeräten zu finden. Das Problem ist, dass Hersteller dazu keine Patches mehr herausgeben.’Dies unterstreicht, wie wichtig es ist, veraltete Komponenten des…
-
Oracle warns customers of health data breach amid public denial
by
in SecurityNews
Tags: access, breach, ceo, cloud, computer, cybersecurity, data, data-breach, Internet, login, oracle, password, service, supply-chain, threatOracle isn’t budging on Cloud breach denial: Cybersecurity firm CloudSEK first reported the cloud breach involving a threat actor “rose87168” selling six million records exfiltrated from single-sign-on (SSO) and Lightweight Directory Access Protocol (LDAP) of Oracle Cloud.While Oracle quickly denied the breach to media outlets, data shared as samples from the breach were validated by…
-
Neuer JFrog-Bericht warnt vor Sicherheitslücken in der Software-Lieferkette im KI-Zeitalter
by
in SecurityNewsDer Bericht thematisiert zudem die mangelnde Transparenz der Code-Herkunft in der Software-Lieferkette. Viele Entwickler laden Open-Source-Pakete direkt aus öffentlichen Registries herunter, ohne Schwachstellen oder Risiken zu berücksichtigen. Weitere Themen umfassen die Herausforderungen durch die “Sicherheits-Tool-Ausuferung” und vieles mehr. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neuer-jfrog-bericht-warnt-vor-sicherheitsluecken-in-der-software-lieferkette-im-ki-zeitalter/a40356/
-
Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve
by
in SecurityNews
Tags: access, attack, automation, best-practice, breach, business, cloud, container, control, cyber, cybersecurity, data, exploit, guide, infrastructure, Internet, microsoft, mobile, network, risk, risk-management, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trustEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve. You can read the entire Exposure Management Academy series here. Traditional vulnerability management is undergoing a transformation.…
-
How CISOs can balance business continuity with other responsibilities
by
in SecurityNews
Tags: attack, backup, breach, business, cio, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, finance, framework, healthcare, incident, incident response, metric, nist, ransomware, resilience, risk, service, strategy, supply-chain, technology, threat, usa, vulnerabilityCIO-CISO divide: Who owns business continuity?: While CISOs may find that their remit is expanding to cover business continuity, a lack of clear delineation of roles and responsibilities can spell trouble.To effectively handle business continuity, cybersecurity leaders need a framework to collaborate with IT leadership.Responding to events requires a delicate balance between thoroughness of investigation…
-
How CISOs can balance business continuity with other responsibilities
by
in SecurityNews
Tags: attack, backup, breach, business, cio, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, finance, framework, healthcare, incident, incident response, metric, nist, ransomware, resilience, risk, service, strategy, supply-chain, technology, threat, usa, vulnerabilityCIO-CISO divide: Who owns business continuity?: While CISOs may find that their remit is expanding to cover business continuity, a lack of clear delineation of roles and responsibilities can spell trouble.To effectively handle business continuity, cybersecurity leaders need a framework to collaborate with IT leadership.Responding to events requires a delicate balance between thoroughness of investigation…
-
KI-Sicherheit in der Software-Lieferkette – Maschinelles Lernen: Wer scannt die Scanner?
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/jfrog-hugging-face-partnerschaft-sicherheitsrisiken-ki-modelle-a-39163361bb2b7e1bdf541c14db27b666/
-
Insider Research im Gespräch – Was Sie über Sicherheitsrisiken in der IT-Lieferkette wissen müssen
by
in SecurityNews
Tags: supply-chainFirst seen on security-insider.de Jump to article: www.security-insider.de/schutz-vor-cyberrisiken-sicherheitsrisiken-in-der-lieferkette-a-6f0d7945e4fcdd174faebf11b7f218e8/
-
Cryptohack Roundup: $13M Abracadabra Hack
by
in SecurityNewsAlso: The Treasury Department Lifts Tornado Cash Sanctions. This week, Abracadabra hack, updates on Tornado Cash and Bybit, $7M scam money recovery, man faces prison for stabbing crypto CEO, movie director charged for swindle, Ripple-SEC case wrap-up, Grinex is the new Garantex, Gotbit plea deal, Coinbase in supply chain hack and Binance insider risk threat.…
-
CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories
by
in SecurityNewsA recent discovery has revealed a potential supply chain attack vulnerability in GitHub’s CodeQL repositories, which could have led to wide-ranging consequences for hundreds of thousands of GitHub users. The exploit hinges on a publicly exposed secret found in a GitHub Actions workflow artifact, which, if utilized by an attacker, could allow malicious code execution…