Tag: supply-chain
-
Malicious NPM Packages Spread PylangGhost RAT in Supply Chain Attack
Malicious npm packages are delivering the North Koreanlinked PylangGhost remote access trojan (RAT) in a new software supply chain campaign that targets developers across Windows, Linux, and macOS systems. The first malicious versions appeared in late February 2026 (@jaime9008/math-service 1.0.11.0.2), followed by react-refresh-update 1.0.11.0.4 published on March 1, 2026. Earlier 1.0.0 versions in both families were benign, a…
-
Health Sector Braces for Stryker Hack Supply Chain Shock
Medical Device Manufacturer Hack Was Likely Opportunistic. An Iranian cyberattack on medical device maker Stryker’s internal IT environment does not appear to affect connected products used by the company’s healthcare clients. But an outage of Stryker’s electronic ordering system could lead to supply chain issues for its customers. First seen on govinfosecurity.com Jump to article:…
-
Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse
Tags: ai, blockchain, control, exploit, infrastructure, malicious, malware, software, supply-chain, tool, updateThe evolving GlassWorm: Earlier research into the GlassWorm operation has revealed techniques such as heavy code obfuscation, the use of Unicode characters to hide malicious logic, and infrastructure that retrieves command-and-control servers through blockchain transactions, making the campaign more resilient to takedowns.The latest wave also mimics widely used developer tools to maximise installation chances. “The…
-
Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse
Tags: ai, blockchain, control, exploit, infrastructure, malicious, malware, software, supply-chain, tool, updateThe evolving GlassWorm: Earlier research into the GlassWorm operation has revealed techniques such as heavy code obfuscation, the use of Unicode characters to hide malicious logic, and infrastructure that retrieves command-and-control servers through blockchain transactions, making the campaign more resilient to takedowns.The latest wave also mimics widely used developer tools to maximise installation chances. “The…
-
AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/
-
AppsFlyer Web SDK used to spread crypto stealer JavaScript code
Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/
-
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry.”Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive First seen…
-
Supply-chain attack using invisible code hits GitHub and other repositories
Unicode that’s invisible to the human eye was largely abandoned”, until attackers took notice. First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/
-
Anthropic Seeks Court Stay of Pentagon Risk Designation
Company Says Supply-Chain Risk Label Threatens Billions in Contracts. Anthropic filed an emergency motion asking a federal appeals court to block a Defense Department decision labeling the AI developer a national security supply-chain risk. The company says the move could cost billions and followed its refusal to weaken AI safety restrictions. First seen on govinfosecurity.com…
-
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Tags: access, attack, authentication, best-practice, ceo, computer, credentials, cyber, cyberattack, data, flaw, group, hacker, identity, infrastructure, intelligence, iran, jobs, mobile, phone, service, software, supply-chain, theft, threat, updateHandala claims credit: The Handala threat group quickly claimed responsibility for the attack. While the group’s involvement is just a claim for now, Stryker employees reportedly saw a version of the Handala logo a cartoon of a Palestinian boy with his back turned and hands crossed behind him on affected devices.Handala’s identity is hard to…
-
‘Systemic Risk’ Stalks Healthcare Sector
For the U.S. healthcare ecosystem, the 2024 ransomware attack on Change Healthcare proved to be a supply-chain earthquake in showcasing critical third-party risk that entities now must carefully and urgently consider, said Erik Decker, CISO of Intermountain Health and a federal cyber adviser. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/systemic-risk-stalks-healthcare-sector-i-5535
-
Destructive Activity Targeting Stryker Highlights Emerging Supply Chain Risks
On March 11th, medical technology company Stryker disclosed that a cyberattack had disrupted portions of its global network infrastructure, affecting Microsoft systems used across the organization. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/destructive-activity-targeting-stryker-highlights-emerging-supply-chain-risks/
-
Nur wer seine Supply Chain kennt, kann sie auch schützen Flut täuscht über reale Gefahren in der Software-Lieferkette hinweg
First seen on security-insider.de Jump to article: www.security-insider.de/software-supply-chain-software-lieferkette-lars-francke-a-dcb083a3a6f9e55c6823e937431d412b/
-
New PhantomRaven NPM attack wave steals dev data via 88 packages
New attack waves from the ‘PhantomRaven’ supply-chain campaign are hitting the npm registry, with dozens of malicious packages that exfiltrate sensitive data from JavaScript developers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages/
-
Monitoring Legitimate Bot Traffic is Now a Cybersecurity Requirement
AI-driven and “legitimate” bots now make up a growing share of web traffic, blurring the line between value and risk. Security teams must treat bot traffic as a governance, cost, and cyber supply chain issue, guided by long-term visibility and analytics. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/monitoring-legitimate-bot-traffic-is-now-a-cybersecurity-requirement/
-
PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
A large-scale malware campaign known as PhantomRaven has resurfaced, targeting the npm software supply chain and attempting to steal sensitive developer credentials. The newly identified packages belong to three new phases of the campaign Wave 2, Wave 3, and Wave 4 distributed between November 2025 and February 2026. Despite the discovery and reporting of the…
-
PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
A large-scale malware campaign known as PhantomRaven has resurfaced, targeting the npm software supply chain and attempting to steal sensitive developer credentials. The newly identified packages belong to three new phases of the campaign Wave 2, Wave 3, and Wave 4 distributed between November 2025 and February 2026. Despite the discovery and reporting of the…
-
PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
A large-scale malware campaign known as PhantomRaven has resurfaced, targeting the npm software supply chain and attempting to steal sensitive developer credentials. The newly identified packages belong to three new phases of the campaign Wave 2, Wave 3, and Wave 4 distributed between November 2025 and February 2026. Despite the discovery and reporting of the…
-
Hackers may have breached FBI wiretap network via supply chain
A suspected breach of the FBI’s wiretap network has investigators asking whether a nation-state was involved. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/hackers-may-have-breached-fbi-wiretap-network-via-supply-chain/
-
The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix
Tags: access, attack, authentication, awareness, business, ciso, compliance, control, cyber, cybersecurity, data, detection, exploit, firewall, incident, incident response, infrastructure, insurance, ISO-27001, metric, mfa, monitoring, network, office, phishing, ransomware, regulation, resilience, risk, risk-management, service, siem, soc, stuxnet, supply-chain, tool, vpn, vulnerability, zero-dayWhy everyone knows it’s burning, but nobody pulls the fire alarm: When I talk to OT managers, production leads or plant engineers, I rarely hear, “We didn’t know we had a problem.” Far more often, it’s, “We know it’s critical, but we can’t just shut it down.” This gap between awareness and action is the…
-
Gogs Flaw Could Let Attackers Quietly Overwrite Large File Storage Data
Tags: attack, cve, cyber, data, exploit, flaw, open-source, software, supply-chain, threat, vulnerabilityA critical security vulnerability has been identified in Gogs, a widely used open-source self-hosted Git service. / Tracked as CVE-2026-25921, this flaw allows unauthenticated attackers to silently overwrite Git Large File Storage (LFS) objects across any repository. By exploiting a lack of content verification, threat actors can conduct stealthy software supply-chain attacks, replacing legitimate project…
-
Airbus CSO on supply chain blind spots, space threats, and the limits of AI red-teaming
Pascal Andrei, CSO at Airbus, knows that the aerospace and defense sector is facing a threat environment that is evolving faster than most organizations can track. From … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/pascal-andrei-airbus-aerospace-defense-cybersecurity/
-
Pentagon’s Anthropic Ban Is a Wake-Up Call for CIOs
AI Shutdown Risk Exposes Governance Gaps and Vendor Dependency Concerns. The federal government’s recent decision to designate Anthropic, maker of the Claude AI platform, as a supply-chain risk should raise alarm bells for technology leaders who are tasked with embedding AI systems across the enterprise. Going all-in with a single AI vendor can be risky.…
-
President Trump’s Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
Tags: access, ai, awareness, business, ceo, cloud, compliance, computing, cryptography, cyber, cybercrime, cybersecurity, data, defense, exploit, governance, government, healthcare, incident response, infrastructure, intelligence, international, malicious, network, regulation, resilience, risk, skills, startup, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability, zero-trustPresident Trump’s Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience. Key takeaways Cybersecurity as a global security imperative: The strategy signals that cybersecurity has evolved beyond a mere “IT issue” to become…
-
ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains
Read the takeaways from ConFoo 2026, including putting guardrails where requests happen, auditing tool calls, treat dependency updates like production access. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/confoo-2026-guardrails-for-agentic-ai-prompts-and-supply-chains/
-
Can the Security Platform Finally Deliver for the Mid-Market?
Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of supply chain attacks, your customers and business partners are defining the security level you must meet.What if you could be the enabler for your organization to remain competitive, and help win business, by easily demonstrating…
-
Supply-Chain-Angriffe: Unterschätzte Gefahr für deutsche Unternehmen
Externe Partnerschaften sind für Unternehmen heute unverzichtbar, erhöhen aber zugleich die Anfälligkeit für Cyberangriffe. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/supply-chain-angriffe-unterschatzte-gefahr
-
Pentagon Moves to Cut Anthropic From Defense AI Work
Defense Contractors May Be Forced to Remove Claude From Pentagon Programs. The Pentagon labeled Anthropic a supply-chain risk after accusing the artificial intelligence firm of restricting military use of its tools, a move that could force defense contractors to cut ties with Claude as the company prepares a legal challenge and the tech sector warns…
-
5 Actions Critical for Cybersecurity Leadership During International Conflicts
Tags: attack, backup, business, cloud, corporate, cyber, cybersecurity, data, exploit, government, incident response, infrastructure, international, iran, middle-east, military, network, resilience, risk, risk-assessment, russia, saas, service, supply-chain, technology, threat, ukraine, update, vulnerability, warfareThe recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture and preparedness. Every crisis that elevates to military engagements between cyber-active participants, changes the risk landscape of businesses, for people, operations, and data. This includes the…

