Tag: supply-chain
-
WatchTowr warns abandoned S3 buckets pose supply chain risk
WatchTowr researchers found that they could reregister abandoned Amazon S3 buckets and detail alarming ways that threat actors could exploit the attack surface. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366618663/WatchTowr-warns-abandoned-S3-buckets-pose-supply-chain-risk
-
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems.The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module (github.com/boltdb/bolt), per Socket. The malicious version (1.3.1) was published to First seen on…
-
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look ‘insignificant’
When cloud customers don’t clean up after themselves, part 97 First seen on theregister.com Jump to article: www.theregister.com/2025/02/04/abandoned_aws_s3/
-
The Secret to Your Artifactory: Inside The Attacker Kill-Chain
Artifactory token leaks are not the most common, but they pose significant risks, exposing sensitive assets and enabling supply chain attacks. This article explores the dangers of leaked tokens and proposes mitigation strategies, including token scoping and implementing least privilege policies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/the-secret-to-your-artifactory-inside-the-attacker-kill-chain/
-
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security.”Maintainers can now archive a project to let users know that the project is not expected to receive any more updates,” Facundo Tuesca, senior engineer…
-
DORA erfordert robuste Risikomanagementprozesse über die gesamte Lieferkette hinweg
Der Finanzsektor ist mit regulatorischen Anforderungen bestens vertraut, doch DORA stellt insbesondere im Bereich Drittanbieter und Lieferketten neue Herausforderungen dar. Eine durchgehende Compliance erfordert die Anpassung von Risikomanagementprozessen und Service-Level-Agreements. Ein Kommentar von Andre Troskie, EMEA Field CISO bei Veeam. Im Gegensatz zu anderen Wirtschaftsbereichen, die ebenfalls die NIS2 einhalten müssen, sind dem Finanzsektor strenge Vorschriften…
-
BlueVoyant verstärkt die Führungsetage mit Michael Montoya als COO
BlueVoyant startet das Jahr 2025 mit mehr als 1.000 Kunden weltweit. Das Unternehmen hat kürzlich seine preisgekrönte BlueVoyant Cyber Defense Platform vorgestellt, die Sicherheitsoperationen der nächsten Generation für die interne, externe und Supply-Chain-Verteidigung bietet. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-verstaerkt-die-fuehrungsetage-mit-michael-montoya-als-coo/a39595/
-
Eclypsium Raises $45M to Guard AI and Telecom Infrastructure
Series C Funding Targets Supply Chain Risks in AI, Next-Gen Infrastructure Security. Eclypsium raised $45 million in Series C funding to address emerging cyber threats in AI workloads, GPU systems and the global supply chain. With support from Qualcomm and 1011 Ventures, the company will to tackle advanced cyberthreats from nation-state adversaries like Volt Typhoon.…
-
API Supply Chain Attacks Put Millions of Airline Users at Risk
An API supply-chain attack affecting a popular online travel booking service put millions of airline users at risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/api-supply-chain-attacks-millions/
-
A pickle in Meta’s LLM code could allow RCE attacks
Tags: ai, attack, breach, cve, cvss, data, data-breach, exploit, flaw, framework, github, LLM, malicious, ml, network, open-source, rce, remote-code-execution, software, supply-chain, technology, theft, vulnerabilityMeta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary code execution on servers leading to resource theft, data breaches, and AI model takeover.The flaw, tracked as CVE-2024-50050, is a critical deserialization bug belonging to a class of vulnerabilities arising from the improper use of the open-source library (pyzmq)…
-
Eclypsium finds security issues in Palo Alto Networks NGFWs
Eclypsium researchers stressed how essential supply chain security is as threat actors increasingly target and exploit vulnerabilities in firewalls, VPNs and other edge devices. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366618492/Eclyspium-finds-security-issues-in-Palo-Alto-Networks-NGFWs
-
Angriff der Plüschdämonen
ESET Forscher entdecken Supply-Chain-Angriff gegen einen VPN-Anbieter in Südkorea durch neue APT-Gruppe “PlushDaemon” First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/eset-research/angriff-der-pluschdamonen/
-
New Supply Chain Attack Targeting Chrome Extensions to Inject Malicious Code
A sophisticated supply chain attack targeting Chrome browser extensions has come to light, potentially compromising hundreds of thousands of users. The attack, which unfolded in December 2024, involved phishing campaigns aimed at extension developers and the injection of malicious code into legitimate Chrome extensions. Sensitive user data, including API keys, session cookies, and authentication tokens…
-
Chinese Cyberspies Target South Korean VPN in Supply Chain Attack
Advanced persistent threat group PlushDaemon, active since 2019, is using a sophisticated modular backdoor to collect data from infected systems in South Korea. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-cyberspies-target-south-korean-vpn-supply-chain-attack
-
Supply chain attack hits Chrome extensions, could expose millions
Threat actor exploited phishing and OAuth abuse to inject malicious code First seen on theregister.com Jump to article: www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/
-
ENISA: Embedding Resilience in Critical Infrastructure
ENISA’s Marnix Dekker on Supply Chain Attacks, Harmonizing the New NIS2 Regulations. The European Union Agency for Cybersecurity is at the center of rolling out new cybersecurity frameworks for critical infrastructure providers across Europe. But a major priority, according to ENISA’s Marnix Dekker, is helping smaller vendors withstand supply chain attacks. First seen on govinfosecurity.com…
-
IPany VPN breached in supply-chain attack to push custom malware
South Korean VPN provider IPany was breached in a supply chain attack by the “PlushDaemon” China-aligned hacking group, who compromised the company’s VPN installer to deploy the custom ‘SlowStepper’ malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ipany-vpn-breached-in-supply-chain-attack-to-push-custom-malware/
-
Call for Presentations Open for SecurityWeek’s 2025 Supply Chain Security Third-Party Risk Summit
Join Us in Shaping the Future of Supply Chain Security – Don’t miss this chance to be part of the conversation addressing one of the most pressing cybersecurity challenges . The post Call for Presentations Open for SecurityWeek’s 2025 Supply Chain Security & Third-Party Risk Summit appeared first on SecurityWeek. First seen on securityweek.com Jump…
-
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET.”The attackers replaced the legitimate installer with one that also deployed the group’s signature implant that we have named SlowStepper…
-
China-aligned PlushDaemon APT compromises supply chain of Korean VPN
ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/22/plushdaemon-apt-slowstepper-supply-chain-compromise/
-
Oracle To Address 320 Vulnerabilities in January Patch Update
Critical flaws include those in Oracle Supply Chain products First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/oracle-320-vulnerabilities-january/
-
US Ban on Automotive Components Could Curb Supply Chain
The US Department of Commerce will prohibit the import of components for connected vehicles from China or Russia, as the US continues to ban technology it sees as potential national security threats. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/us-ban-automotive-components-supply-chain
-
How organizations can secure their AI code
Tags: ai, application-security, awareness, backdoor, breach, business, chatgpt, ciso, compliance, control, credentials, crime, cybersecurity, data, data-breach, finance, github, healthcare, LLM, malicious, ml, open-source, organized, programming, risk, risk-management, software, startup, strategy, supply-chain, technology, tool, training, vulnerabilityIn 2023, the team at data extraction startup Reworkd was under tight deadlines. Investors pressured them to monetize the platform, and they needed to migrate everything from Next.js to Python/FastAPI. To speed things up, the team decided to turn to ChatGPT to do some of the work. The AI-generated code appeared to function, so they…
-
Biden order gives CISA software supply chain ‘teeth’
The outgoing administration makes a Hail Mary attempt to salvage work it began in 2021 to require specific software supply chain security information from software suppliers. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366618234/Biden-order-gives-CISA-software-supply-chain-teeth
-
AI and Applied Security Dominate Nullcon Paper Submissions
CFP Board Members Discuss AI, Hardware Access and Emerging Trends for Nullcon 2025. Cybersecurity research submissions for the Nullcon 2025 CFP Review Board reflect prominent trends and challenges in the field. Nullcon CFP Review Board members Anant Shrivastava and Neelu Tripathi noted a growing focus on AI, supply chain and applied security. First seen on…
-
Cyber Insights 2025: Open Source and Software Supply Chain Security
Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge. The post Cyber Insights 2025: Open Source and Software Supply Chain Security appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cyber-insights-2025-open-source-and-the-software-supply-chain/

