#software supply chain

[ follow ]
#software-supply-chain
US politics
fromSecurityWeek
4 weeks ago

White House Scraps 'Burdensome' Software Security Rules

OMB rescinded prior mandatory software supply chain rules, shifting responsibility to agency heads to create tailored software and hardware security policies based on mission risk.
US politics
fromNextgov.com
1 month ago

OMB reverses Biden-era software attestation order

Federal policy requiring a single standardized software self-attestation was rescinded; agencies must tailor cybersecurity assurance and risk assessments to mission needs.
Information security
fromSecurityWeek
1 week ago

Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction

Palo Alto Networks is acquiring Koi to enhance AI-aware endpoint security and integrate agentic protections into its Prisma AIRS and Cortex XDR platforms.
fromInfoWorld
1 week ago

Open source maintainers are being targeted by AI agent as part of 'reputation farming'

The important shift is that software contribution itself is becoming programmable,
Artificial intelligence
#open-source
fromComputerworld
1 month ago

Jamf has a warning for macOS vibe coders

But like everything else in life, there will always be a more powerful AI waiting in the wings to take out both protagonists and open a new chapter in the fight. Acclaimed author and enthusiastic Mac user Douglas Adams once posited that Deep Thought, the computer, told us the answer to the ultimate question of life, the universe, and everything was 42, which only made sense once the question was redefined. But in today's era, we cannot be certain the computer did not hallucinate.
Artificial intelligence
#npm
fromInfoWorld
1 month ago
Information security

From typos to takeovers: Inside the industrialization of npm supply chain attacks

Information security
fromSecuritymagazine
5 months ago

2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss

Eighteen widely used npm packages were compromised via a maintainer's phishing-induced 2FA breach, risking a supply-chain attack across millions of weekly downloads.
Information security
fromThe Hacker News
5 months ago

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

Phished npm maintainer led to malicious updates in 20 popular packages that steal cryptocurrency by intercepting and rewriting transaction requests to attacker wallets.
fromInfoWorld
1 month ago
Information security

From typos to takeovers: Inside the industrialization of npm supply chain attacks

Information security
fromArs Technica
1 month ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
#container-security
Information security
fromTechzine Global
2 months ago

Docker removes paywall for hardened images

Docker is releasing Docker Hardened Images as free, Apache 2.0–licensed, Debian/Alpine-based pre-secured container images accessible to developers, teams, and organizations without license fees.
Information security
fromThe Hacker News
2 months ago

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

A malicious NuGet package impersonating Tracer.Fody stole Stratis cryptocurrency wallet files and passwords, exfiltrating them to a Russian-hosted server.
Information security
fromIT Pro
2 months ago

A concerning number of Log4j downloads are still vulnerable four years on

Over 13% of Log4j downloads remain vulnerable to Log4Shell, and most vulnerable open-source components are still downloaded despite available fixed versions.
fromDeveloper Tech News
2 months ago

Software development in 2026: Curing the AI party hangover

In 2026, generative AI stops being an experiment for software development and starts being an architectural liability. The initial rush to apply AI everywhere is hardening into a struggle with execution, where the primary hurdles are no longer capability, but control, cost, and security. We are already seeing the cracks in code integrity. As AI-assisted development becomes standard, the volume of code produced is outpacing human capacity to audit it. This "vibe coding" prioritises speed over structural soundness, creating a new category of technical debt.
Software development
#shadow-ai
fromInfoQ
2 months ago
Information security

JFrog Unveils "Shadow AI Detection" to Tackle Hidden AI Risks in Enterprise Software Supply Chains

fromInfoQ
2 months ago
Information security

JFrog Unveils "Shadow AI Detection" to Tackle Hidden AI Risks in Enterprise Software Supply Chains

Python
fromPython Software Foundation Blog
2 months ago

Sovereign Tech Agency and PSF Security Partnership

Investment improves CPython and PyPI security and reliability via archive-module fuzz-testing and OAuth/OIDC-based verified account recovery, enhancing supply chain resilience and user experience.
Information security
fromInfoQ
3 months ago

Trust No One: Securing the Modern Software Supply Chain with Zero Trust

Apply Zero Trust principles to secure software supply chains and CI/CD pipelines by managing dependencies, enforcing controls, and embedding developer-focused security practices.
Information security
fromTheregister
4 months ago

Chinese cyberspies compromised Russian tech provider

Chinese state-linked APT group Jewelbug compromised a Russian IT services firm from early 2025 to May, risking software supply-chain attacks on customers.
Tech industry
fromTheregister
4 months ago

'Highly sophisticated' government goons hacked F5

Nation-state hackers breached F5, stealing BIG-IP source code, undisclosed vulnerability details, and some customers' configuration data while maintaining long-term access.
Information security
fromWIRED
4 months ago

Vibe Coding Is the New Open Source-in the Worst Way Possible

AI-generated vibe coding speeds development but can reproduce existing and new vulnerabilities, increasing software-supply-chain risk and demanding revised development lifecycles and rigorous human review.
Software development
fromTheregister
4 months ago

Kroah-Hartman explains Cyber Resilience Act for open source

The EU Cyber Resilience Act largely protects individual open-source contributors while placing documentation, SBOM, vulnerability-tracking, and transparency obligations on product-producing organizations.
Information security
fromThe Hacker News
4 months ago

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

Threat actors hide malware inside legitimate-seeming AI and productivity tools, distributing the EvilAI campaign globally across sectors to enable stealthy, future attacks.
fromTheregister
5 months ago

OpenSSF to freeloaders: Open source infra isn't free

A coalition of heavyweight open source foundations issued a joint statement via the foundation on Tuesday, declaring that "open infrastructure is not free" and warning that the critical machinery behind modern software development is being stretched to breaking point. Package registries like Maven Central, PyPI, crates.io, npm, and Packagist handle billions of downloads every month, yet the organizations running them are often scraping by on donations, grants, and the goodwill of a few sponsors.
Software development
Information security
fromFuturism
5 months ago

CrowdStrike Infested With "Self-Replicating Worms"

A self-replicating NPM worm named Shai-Hulud stole access tokens to compromise maintainer accounts and propagate across hundreds of packages, including CrowdStrike-managed modules.
Software development
fromDevOps.com
5 months ago

Sketch Coding and the Rise of MCP in DevOps - DevOps.com

Developer-focused culture and hands-on coding drive JFrog's innovation, blending AI, DevOps, and open source to create scalable, secure software supply chain tools.
Artificial intelligence
fromDevOps.com
5 months ago

Bringing Trust and Governance to AI-Driven DevOps - DevOps.com

AI is transforming DevOps by reshaping productivity, security, and software supply chains, requiring trust, verification, and alignment with practitioner experience.
fromInfoWorld
5 months ago

JFrog announces 'agentic repo' for AI-driven development

JFrog has introduced JFrog Fly, an offering the company describes as a zero-config, "agentic repository" for accelerating AI-driven software development. Introduced September 9, JFrog Fly is intended to support agentic workflows for development teams. AI agents orchestrate artifacts across the software life cycle, enabling developers to focus on delivering software to production with speed and scale, according to JFrog. Developers can join a beta waitlist for JFrog Fly.
Artificial intelligence
Artificial intelligence
fromDevOps.com
5 months ago

JFrog CEO: AI Agents Require Practices Beyond Security, Traceability - DevOps.com

Foundational software platforms must embed agentic AI practices, security, traceability, and a single system of record to manage AI-driven development and supply-chain risk.
#sbom
#ai
fromTechzine Global
7 months ago
DevOps

JFrog launches MCP Server for AI-driven development workflows

JFrog's MCP Server enhances developer productivity by integrating AI capabilities into coding environments.
fromWIRED
9 months ago
Artificial intelligence

AI Code Hallucinations Increase the Risk of 'Package Confusion' Attacks

AI-generated code often references non-existent third-party libraries, posing risks for supply-chain attacks.
Artificial intelligence
fromWIRED
9 months ago

AI Code Hallucinations Increase the Risk of 'Package Confusion' Attacks

AI-generated code often references non-existent third-party libraries, posing risks for supply-chain attacks.
Information security
fromThe Hacker News
7 months ago

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

North Korean threat actors are deploying malicious npm packages as part of ongoing software supply chain attacks against the open-source ecosystem.
#cybersecurity
fromDevOps.com
9 months ago
Software development

Checkmarx Surfaces Malicious Effort to Compromise Software Supply Chains - DevOps.com

Software development
fromDevOps.com
9 months ago

Checkmarx Surfaces Malicious Effort to Compromise Software Supply Chains - DevOps.com

New malware targets application developers through typo-squatting, aiming to compromise software supply chains by providing persistent access and data exfiltration.
fromDevOps.com
8 months ago

JFrog Extends Alliance With NVIDIA to Secure AI Software Supply Chain - DevOps.com

JFrog and NVIDIA have expanded integrations to include the Enterprise AI Factory, enabling the management of AI applications through JFrog's Software Supply Chain Platform.
Artificial intelligence
DevOps
fromInfoQ
9 months ago

Docker Introduces Hardened Images to Strengthen Container Security

Docker's Hardened Images significantly enhance container security by reducing attack surfaces and minimizing vulnerabilities.
DevOps
fromDevOps.com
10 months ago

Veracode Extends Scope and Reach of DevSecOps Portfolio - DevOps.com

Veracode enhances its risk management tool to strengthen DevSecOps capabilities and improve vulnerability identification in Kubernetes environments.
[ Load more ]