Tag: supply-chain
-
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
by
in SecurityNewsThe developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with cryptocurrency mining malware.Following the discovery, versions 1.1.7 of both libraries have been unpublished from the npm registry.…
-
Supply Chain Risk Mitigation Must Be a Priority in 2025
by
in SecurityNewsA balance of rigorous supplier validation, purposeful data exposure, and meticulous preparation is key to managing and mitigating risk. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/supply-chain-risk-mitigation-priority-2025
-
Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
by
in SecurityNewsResearchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to those previously seen in the npm community. Malicious actors are increasingly exploiting npm packages to distribute malicious code, mirroring tactics previously used in VSCode extensions that involve the npm package etherscancontracthandler,…
-
IAM Predictions for 2025: Identity as the Linchpin of Business Resilience
by
in SecurityNews
Tags: access, ai, apple, attack, authentication, banking, breach, business, cloud, compliance, corporate, credentials, crime, data, deep-fake, detection, finance, iam, identity, malicious, microsoft, mobile, office, passkey, password, privacy, regulation, resilience, risk, service, supply-chain, theft, threat, tool, vulnerabilityIAM Predictions for 2025: Identity as the Linchpin of Business Resilience madhav Thu, 12/19/2024 – 05:33 As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) landscape. The numbers tell the story: The latest Identity Theft Resource Center report indicates that consumers…
-
Malicious Microsoft VSCode extensions target devs, crypto community
by
in SecurityNewsMalicious Visual Studio Code extensions were discovered on the VSCode marketplace that download heavily obfuscated PowerShell payloads to target developers and cryptocurrency projects in supply chain attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/malicious-microsoft-vscode-extensions-target-devs-crypto-community/
-
New Attacks Exploit VSCode Extensions and npm Packages
by
in SecurityNewsMalicious campaigns targeting VSCode extensions have recently expanding to npm, risking software supply chains First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/threat-actors-exploit-vscode/
-
Key strategies to enhance cyber resilience
by
in SecurityNews
Tags: attack, awareness, backup, banking, breach, business, ceo, compliance, control, crowdstrike, cyber, cybersecurity, data, finance, government, group, healthcare, incident, incident response, infrastructure, insurance, metric, network, phishing, programming, ransom, ransomware, resilience, risk, security-incident, service, skills, software, strategy, supply-chain, technology, threat, training, update, vulnerability, windowsThe faulty CrowdStrike software update that triggered IT outages on a global scale in July was a sobering reminder of the importance of incident response and business continuity plans.The update caused more than eight million Windows devices to crash and take down with them airline reservation systems, hospital and government services, financial and banking applications…
-
Sonar Expands to Third-Party Code Security with Tidelift Buy
by
in SecurityNewsDeal Targets Open Source Library Risks in Software Supply Chain, Boosts DevSecOps. The integration of Tidelift into Sonar’s ecosystem will enhance software supply chain security by leveraging human-verified insights from maintainers of popular open source libraries. Developers can expect comprehensive tools to address vulnerabilities in first-party, AI-generated, and third-party code. First seen on govinfosecurity.com Jump…
-
Sonar Expands to Third-Party Code Security with Tidelift Buy
by
in SecurityNewsDeal Targets Open Source Library Risks in Software Supply Chain, Boosts DevSecOps. The integration of Tidelift into Sonar’s ecosystem will enhance software supply chain security by leveraging human-verified insights from maintainers of popular open source libraries. Developers can expect comprehensive tools to address vulnerabilities in first-party, AI-generated, and third-party code. First seen on govinfosecurity.com Jump…
-
Harnessing Threat Intel and Automation to Counter Supply Chain Risks
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/harnessing-threat-intel-and-automation-to-counter-supply-chain-risks
-
All Major European Financial Firms Suffer Supplier Breaches
by
in SecurityNewsSecurityScorecard claims 100% of Europe’s top financial services companies have suffered a supply chain breach in the past year First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/all-europes-top-financial-firms/
-
390,000 WordPress accounts stolen from hackers in supply chain attack
by
in SecurityNewsA threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat actors using a trojanized WordPress credentials checker. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
-
Sinkendes Sicherheitsniveau und verschärfte Rahmenbedingungen belasten Developer
by
in SecurityNews
Tags: supply-chainDer neue Snyk-Report zeigt: Wachsende Anforderungen und unzureichende Supply-Chain-Sicherheit überfordern Teams. Dennoch sind OSS-Projekte im Vorteil. First seen on heise.de Jump to article: www.heise.de/news/Sinkendes-Sicherheitsniveau-und-verschaerfte-Rahmenbedingungen-belasten-Developer-10198335.html
-
Time of Reckoning Reviewing My 2024 Cybersecurity Predictions
by
in SecurityNews
Tags: ai, attack, automation, awareness, breach, business, chatgpt, china, compliance, cyber, cyberattack, cybercrime, cybersecurity, data, data-breach, disinformation, election, espionage, exploit, healthcare, incident response, infrastructure, jobs, law, linkedin, malware, monitoring, moveIT, phishing, privacy, ransomware, regulation, risk, russia, service, software, supply-chain, technology, threat, tool, ukraine, update, vulnerability, warfare, zero-dayThe brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions. Anyone can make predictions (and far too many do), but actually being correct is another matter altogether. It is commonplace for security companies…
-
Yearlong supply-chain attack targeting security pros steals 390K credentials
by
in SecurityNewsMultifaceted, high-precision campaign targets malicious and benevolent hackers alike. First seen on arstechnica.com Jump to article: arstechnica.com/security/2024/12/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/
-
Cyberint’s 2024 Report Highlights Surge in Credential Theft and Rise of AI-Powered Phishing
by
in SecurityNewsCyberint, a Check Point company, has released its 2024 Cyber Security Landscape Report, painting a concerning picture of the evolving threat landscape. The report, drawing on data from the Cyberint Argos Platform, analysed 140,000 cyber threat alerts across critical industries, revealing a 333% surge in credential theft, a significant rise in supply chain attacks, and…
-
Ultralytics Supply-Chain Attack
by
in SecurityNewsLast week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary: On December 4, a malicious version 8.3.41 of the popular AI library ultralytics ”, which has almost 60 million downloads”, was published to the Python Package Index (PyPI) package repository. The package contained downloader code that was downloading…
-
KI-gestützte Bedrohungen und Schwachstellen in der Lieferkette dominieren Europas Bedrohungslandschaft
by
in SecurityNewsCyberint, ein Unternehmen von Check Point, stellt in neuestem Bericht einen Anstieg von 333 Prozent bei Datendiebstählen fest und warnt vor KI-getriebener Ransomware. Cyberint, jetzt Check Point External Risk Management, hat in seinem Bericht alarmierende Erkenntnisse veröffentlicht, welche die rasante Entwicklung von Cyber-Bedrohungen behandeln. Der Bericht zeigt einen Anstieg des […] First seen on netzpalaver.de…
-
KI-gestützte Bedrohungen und Schwachstellen in der Lieferkette dominieren in Europa
by
in SecurityNewsDer Bericht ‘Europe Threat Landscape Report 2024-2025″ bietet Organisationen ein hilfreiches Framework, um sich in der Cyber-Bedrohungslandschaft zurechtzufinden und auf die bevorstehenden Herausforderungen vorbereiten zu können. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-gestuetzte-bedrohungen-und-schwachstellen-in-der-lieferkette-dominieren-in-europa/a39257/
-
IT pros say hackers could compromise device supply chain, firmware security
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/it-pros-say-hackers-could-compromise-device-supply-chain-firmware-security
-
Checkmarx CEO: Evolving Supply Chain Threats Demand Action
by
in SecurityNewsCheckmarx’s Sandeep Johri Details Malicious Code, AI Risks in Application Security. As software complexities grow, supply chain security is now essential to application security, according to Sandeep Johri, Checkmarx CEO. Johri discusses the challenges of malicious code, adversarial AI and the market’s call for consolidated security platforms. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/checkmarx-ceo-evolving-supply-chain-threats-demand-action-a-27040
-
Die wichtigsten Cybersecurity-Prognosen für 2025
by
in SecurityNews
Tags: access, ai, apple, apt, cloud, cyberattack, cybercrime, cybersecurity, cyersecurity, data, deep-fake, governance, incident response, jobs, kritis, malware, military, mobile, nis-2, ransomware, service, software, stuxnet, supply-chain -
Cardiac surgery device manufacturer falls prey to ransomware
by
in SecurityNews
Tags: attack, breach, business, cyber, cyberattack, cybercrime, data, group, hacker, healthcare, ransom, ransomware, service, supply-chainThe healthcare industry has been increasingly in the crosshairs of cyberattackers this year, with ransomware near the top of the sector’s biggest cyber threats. Hackers are attacking IT systems and personal data, among other things, with the aim of manipulation or theft. But it’s not just hospitals that are affected by cyberattacks; their suppliers are under attack as well.…
-
Containers have 600+ vulnerabilities on average
by
in SecurityNewsContainers are the fastest growing and weakest cybersecurity link in software supply chains, according to NetRise. Companies are struggling to get container … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/11/containers-security-concerns/
-
Lessons From the Largest Software Supply Chain Incidents
by
in SecurityNewsThe software supply chain is a growing target, and organizations need to take special care to safeguard it. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/lessons-largest-software-supply-chain-incidents
-
Blue Yonder investigating data leak claim following ransomware attack
by
in SecurityNewsThe software supply chain company is widening its investigation after Termite ransomware leaked data it claims is linked to the attack. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/blue-yonder-data-leak-ransomware/734987/