Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain.The Checkmarx Research team has uncovered a...
Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data,...
North Korea, DPRK threat actors, have been reportedly involved in several supply-chain attacks to gain unauthorized access to the intranet of an organization.One...
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...
In any industry, a supply chain is an aggregation of in-house resources, external dependencies, production infrastructure, and workforce. It is an essential component in...
As part of a new supply-chain attack being carried out against the Comm100 Live Chat application, the official installer for the application was trojanized.Comm100...
Supply chain attacks are becoming increasingly popular and frequent as they allow attackers to infect a large number of different organizations by compromising just...