#supply-chain-risk

[ follow ]
Information security
fromSecuritymagazine
3 days ago

Economic Uncertainty Leads to Additional Security Risks

Economic and geopolitical-driven supply chain shifts and third-party remote access are raising cyber risk to CPS, prompting supply-chain redesigns and security overhauls.
fromThe Local Germany
1 week ago

Inside Germany's rare earth treasure chest

In a World War II bunker east of Frankfurt, a steel door weighing over four tonnes protects Germany's largest reserve of rare earths, a treasure at the heart of rising geopolitical tensions. The exact location of the bunker is confidential and the site is under close video surveillance. This is where Tradium, a German company specialised in trading rare earths, keeps thousands of barrels of the precious materials - almost all from China, the world's biggest producer.
Miscellaneous
#cybersecurity
Information security
fromTechCrunch
1 month ago

Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks | TechCrunch

AI adoption and vibe coding expand attack surfaces as both developers and attackers use AI tools, causing insecure implementations, prompt-driven exploits, and supply-chain risks.
fromTechCrunch
1 month ago

Jaguar Land Rover to pause production until next week - at least | TechCrunch

Luxury car-maker Jaguar Land Rover will not resume production at its factories for yet another week as it continues to grapple with fallout from a cyberattack. In early September, the Jaguar Land Rover stopped production at its factories in the U.K. after it was impacted by a cyberattack in which hackers stole company data. Jaguar Land Rover has not said what data was stolen.
Information security
UK news
fromwww.bbc.com
1 month ago

JLR shutdown extended again as ministers meet suppliers

Jaguar Land Rover production remains suspended until at least October 1 due to a late‑August cyber attack, threatening suppliers and prompting government engagement.
Information security
fromThe Hacker News
1 month ago

Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

CISOs must prioritize preserving institutional trust and business continuity by securing complex relationships, supply chains, and adapting to AI-driven attacks and regulatory changes.
fromTheregister
2 months ago

AI-powered penetration tool downloaded 10K times

Villager, a new penetration-testing tool linked to a suspicious China-based company and described by researchers as "Cobalt Strike's AI successor," has been downloaded about 10,000 times since its release in July. The package, published on Python Package Index, operates as a Model Context Protocol (MCP) client and integrates multiple security tools. It includes Kali Linux, which legitimate defenders use to automate penetration testing, and it contains hundreds of tools that can also be used to launch cyber attacks at scale.
Python
fromSecuritymagazine
2 months ago

Critical Steps to Strengthening Satellite Network Security

Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations. As our dependency on satellite networks has increased, so has the risk of cyber threats targeting these critical infrastructures. Any disruption of satellite services can negatively impact everything from emergency response systems to financial transactions to navigation. That makes ensuring the cybersecurity of satellite networks essential to maintaining global stability and security.
Information security
fromBusiness Matters
2 months ago

Clear Insurance Management Advises Retailers to Boost Security Measures Post M&S Cyber Scare

In the recent M&S breach, only £100 million of cyber insurance was in place, far short of the £300 million in damages incurred, leaving the retail giant significantly underinsured. With more retailers relying heavily on online operations and third-party platforms, the financial impact of operational downtime from data breaches can be severe and widespread. Yet many businesses still lack adequate-or any-cyber insurance.
Information security
Information security
fromSecuritymagazine
2 months ago

378 GB of Data From Navy Federal Credit Union Exposed

A publicly exposed 378.7 GB database linked to Navy Federal Credit Union contained sensitive backups, logs, and business logic, enabling credential-stuffing, phishing, and supply-chain risks.
US politics
fromFortune
2 months ago

Federal appeals court tariff ruling signals CFOs to 'plan for turbulence'

Most Trump-era tariffs were ruled illegal by a federal appeals court, creating near-term uncertainty while tariffs may remain pending appeals and possible reimposition.
fromTheregister
2 months ago

Frostbyte10 bugs put grocery refrigeration devices at risk

Ten vulnerabilities in Copeland controllers, which are found in thousands of devices used by the world's largest supermarket chains and cold storage companies, could have allowed miscreants to manipulate temperatures and spoil food and medicine, leading to massive supply-chain disruptions. The flaws, collectively called Frostbyte10, affect Copeland E2 and E3 controllers, used to manage critical building and refrigeration systems, such as compressor groups, condensers, walk-in units, HVAC, and lighting systems. Three received critical-severity ratings.
Information security
[ Load more ]