Thursday, December 12, 2024
Search results for:

supply chain

170K+ Python Developers GitHub Accounts Hacked in Supply Chain Attack

Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain. The Checkmarx Research team has uncovered a...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data,...

MavenGate Supply Chain Attack Let Attackers Hijack Java & Android Apps

Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the vendor, partner, or supplier...

DPRK Hackers Exploit MagicLine4NX Zero-day in Supply Chain Attacks

North Korea, DPRK threat actors, have been reportedly involved in several supply-chain attacks to gain unauthorized access to the intranet of an organization. One...

North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains

The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...

Carderbee Hacking Group Uses Legitimate Software in Supply Chain Attack

For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims, an unknown APT group...

The Importance of Understanding Your Software Supply Chain: Managing Risks in Third-Party Code

In any industry, a supply chain is an aggregation of in-house resources, external dependencies, production infrastructure, and workforce. It is an essential component in...

How Visibility on Software Supply Chain Can Reduce Cyberattacks

With cyberattacks cropping up in several tech sectors today, there is rightly more focus on monitoring software supply chains in the SDLC than ever...