Friday, March 29, 2024
Home Search

supply chain - search results

If you're not happy with the results, please do another search

170K+ Python Developers GitHub Accounts Hacked in Supply Chain Attack

0
Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain.The Checkmarx Research team has uncovered a...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

0
Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data,...

MavenGate Supply Chain Attack Let Attackers Hijack Java & Android Apps

0
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the vendor, partner, or supplier...

DPRK Hackers Exploit MagicLine4NX Zero-day in Supply Chain Attacks

0
North Korea, DPRK threat actors, have been reportedly involved in several supply-chain attacks to gain unauthorized access to the intranet of an organization.One...

North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains

0
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...

Carderbee Hacking Group Uses Legitimate Software in Supply Chain Attack

0
For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims, an unknown APT group...

The Importance of Understanding Your Software Supply Chain: Managing Risks in Third-Party Code

0
In any industry, a supply chain is an aggregation of in-house resources, external dependencies, production infrastructure, and workforce. It is an essential component in...

How Visibility on Software Supply Chain Can Reduce Cyberattacks

0
With cyberattacks cropping up in several tech sectors today, there is rightly more focus on monitoring software supply chains in the SDLC than ever...
Comm100 Live Chat App Hijacked in Supply Chain Attack to Deliver Malware

Comm100 Live Chat App Hijacked in Supply Chain Attack to Deliver Malware

0
As part of a new supply-chain attack being carried out against the Comm100 Live Chat application, the official installer for the application was trojanized.Comm100...

Patching: The Key to Dodging Software Supply Chain Attacks

0
Supply chain attacks are becoming increasingly popular and frequent as they allow attackers to infect a large number of different organizations by compromising just...

Managed WAF protection

Website

Recent Articles