#supply-chain-security

[ follow ]
fromTechzine Global
3 days ago

Pentagon labels Anthropic a supply chain risk

The conflict arose during negotiations for a new contract between the Pentagon and Anthropic. The Department of Defense attempted to establish clear agreements on access to and use of the AI technology. However, the talks stalled when Anthropic demanded guarantees that its models would not be used for mass surveillance of American citizens or for the deployment of autonomous weapons systems.
Artificial intelligence
Artificial intelligence
fromwww.bbc.com
3 days ago

Anthropic labelled a supply chain risk by Pentagon

The US Pentagon designated AI firm Anthropic a supply chain risk for refusing to grant unrestricted government access to its AI tools, citing concerns about mass surveillance and autonomous weapons.
US politics
fromThe Mercury News
4 days ago

Kounalakis: Trump's attacks on California condemn America to dependency on China

Rare earth elements control modern technology supply chains; China dominates 80% of global production, creating critical U.S. security vulnerability that requires domestic solutions rather than foreign policy coercion.
#cybersecurity
fromHackernoon
2 years ago
Privacy professionals

Decentralized Public-Key Infrastructure: The Future of Supply Chain Security | HackerNoon

fromHackernoon
2 years ago
Privacy professionals

Decentralized Public-Key Infrastructure: The Future of Supply Chain Security | HackerNoon

Intellectual property law
fromTechCrunch
6 days ago

Tech workers urge DOD, Congress to withdraw Anthropic label as a supply chain risk | TechCrunch

Tech workers oppose DOD's designation of Anthropic as a supply chain risk following the AI company's refusal to grant unrestricted military access to its systems.
Information security
fromTechzine Global
1 week ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromAxios
1 week ago

Trump moves to blacklist Anthropic over AI fight with Pentagon

The Pentagon put its ultimatum in writing on Wednesday night, reiterating its demand that Anthropic agree to let the military use its technology for "all lawful purposes." Anthropic CEO Dario Amodei responded with a public statement laying out the company's concerns and stating "we cannot in good conscience accede to their request."
US politics
Information security
fromThe Hacker News
1 week ago

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

A malicious NuGet package named StripeApi.Net impersonated Stripe's legitimate library to steal financial sector developers' API tokens and sensitive data.
fromBusiness Insider
1 week ago

How the Pentagon picks what drones to buy in a Chinese-dominated market

The push reflects a broader Pentagon effort to field large numbers of low-cost drones quickly without creating new dependencies that could backfire in a fight. The Blue UAS [Uncrewed Aerial Systems] List provides service branches and federal agencies with a catalog of approved drones they can buy.
US news
Information security
fromThe Hacker News
1 week ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
Information security
fromSecurityWeek
1 week ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
World news
fromwww.aljazeera.com
2 weeks ago

Calculated hypocrisy: Why Western powers court Beijing but rely on US

Western economic engagement with China reflects pragmatic economic diversification and strategic hedging, not a strategic realignment away from the United States.
Information security
fromInfoWorld
2 weeks ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
Information security
fromTechzine Global
2 weeks ago

Vulnerable VS Code extensions affect tens of millions of developers

Three vulnerabilities in popular VS Code extensions enable lateral movement and OS-level compromise, risking sensitive local credentials, data, and entire development environments.
Startup companies
fromTechCrunch
2 weeks ago

SpaceX vets raise $50M Series A for data center links | TechCrunch

Mesh Optical Technologies will mass-produce optical transceivers to supply AI data centers, reducing reliance on Chinese-dominated supply chains.
EU data protection
fromTechzine Global
3 weeks ago

Trusted Tech Alliance establishes five principles for secure technology

Sixteen global tech companies formed the Trusted Tech Alliance to embed transparency, security, and data protection across the entire technology stack.
#third-party-risk
#critical-minerals
fromFortune
1 month ago
US politics

Metals are the new oil, JD Vance pitches to America: 'There's no realer thing than critical minerals' | Fortune

fromTechCrunch
1 month ago
US politics

Trump's critical mineral reserve is an admission that the future is electric | TechCrunch

fromAxios
1 month ago
US politics

Exclusive: Bipartisan plan in Congress aims to create U.S. reserve for critical minerals

fromFortune
1 month ago
US politics

Metals are the new oil, JD Vance pitches to America: 'There's no realer thing than critical minerals' | Fortune

fromTechCrunch
1 month ago
US politics

Trump's critical mineral reserve is an admission that the future is electric | TechCrunch

fromAxios
1 month ago
US politics

Exclusive: Bipartisan plan in Congress aims to create U.S. reserve for critical minerals

JavaScript
fromInfoWorld
1 month ago

Beyond NPM: What you need to know about JSR

The JavaScript Registry simplifies and secures JavaScript package creation, distribution, and consumption while addressing NPM's TypeScript complexity and provenance shortcomings.
#rare-earths
#rare-earth-minerals
Information security
fromThe Hacker News
1 month ago

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Eclipse Foundation will require pre-publish security checks on Open VSX Registry VS Code extensions to proactively prevent malicious or compromised extensions.
Information security
fromSecurityWeek
1 month ago

Critical React Native Vulnerability Exploited in the Wild

Critical CVE-2025-11953 (Metro4Shell) in React Native's Community CLI/Metro is being actively exploited since December, exposing thousands of internet-accessible instances.
US politics
fromThe Cipher Brief
1 month ago

The U.S.-China Economic Cold War Is No Longer Silent

U.S. outsourced critical industry, losing semiconductor and rare-earth leadership; China militarizes economic assets, prompting a U.S. economic war cabinet and an Economic Defense Unit.
fromEntrepreneur
1 month ago

The Only Crew with Access to a $450 Million 'Gold Rush'

But after decades of outsourcing tungsten production, the federal government has now begun restricting imports. United States Tungsten founders Stacy Hastie and Randy Waterfield saw this coming. They're reviving what was once America's largest tungsten mine, the Tungsten Queen. It's a site holding an estimated 1 million tons of tungsten with an in-ground value approaching $450 million, the company says. And it says it is already in talks with the U.S. Government.
Venture
Information security
fromTechzine Global
1 month ago

AI hallucinates in 28 percent of dependency upgrades

AI dependency-upgrade recommendations often reference non-existent or dangerous package versions, causing broken pipelines, wasted developer time, and increased supply‑chain risk.
fromInfoWorld
1 month ago

Unplugged holes in the npm and yarn package managers could let attackers bypass defenses against Shai-Hulud

saving lockfile integrity checks (package-lock.json, pnpm-lock.yaml, and others) to version control (git). The lockfile records the exact version and integrity hash of every package in a dependency tree. On subsequent installs, the package manager checks incoming packages against these hashes, and if something doesn't match, installation fails. If an attacker compromises a package and pushes a malicious version, the integrity check should catch the mismatch and block it from being installed.
Information security
Information security
fromInfoWorld
1 month ago

GitLab 2FA login protection bypass lets attackers take over accounts

A critical 2FA bypass (CVE-2026-0723) in GitLab Community and Enterprise requires immediate patching to prevent account compromise and supply-chain attacks.
fromTheregister
1 month ago

EU mulls axing Chinese kit from networks within 3 years

Europe faces increasingly sophisticated hybrid attacks on every area of its infrastructure, the EC claims. The revised Cybersecurity Act looks to address this with union-level risk assessments, combined with targeted mitigation measures that will include bans on IT components from "high-risk suppliers." The suggested timeframe for this could leave member states with as little as three years to remove non-compliant kit.
Miscellaneous
Information security
fromTheregister
1 month ago

Best of British: UK's infosec envoys are mostly US firms

UK government appointed company ambassadors to promote the Software Security Code of Practice, aiming to improve software supply chain security, commercial trust, and cyber defenses.
#python
fromComputerWeekly.com
1 month ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
#open-source
fromPythonbytes
2 months ago

Malicious Package? No Build For You!

Charlie Marsh announced the Beta release of ty on Dec 16 "designed as an alternative to tools like mypy, Pyright, and Pylance." Extremely fast even from first run Successive runs are incremental, only rerunning necessary computations as a user edits a file or function. This allows live updates.
DevOps
fromThe Hacker News
2 months ago

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations

As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust, and execution speed. This report examines how core areas of cybersecurity are evolving in response to that shift. Across authentication, endpoint security, software supply chain protection, network visibility, and human risk, it explores how defenders are adapting to adversaries that move faster, blend technical and social techniques, and exploit gaps between systems rather than weaknesses in any single control.
Artificial intelligence
fromFortune
2 months ago

Seafood thieves snatch $400,000 of lobster, plus oysters and crabs, in round of New England robberies | Fortune

The first seafood vanished on Nov. 22 in Falmouth, Maine, where authorities suspect someone stole 14 cages full of oysters from an aquaculture site in Casco Bay. Many of the oysters were full-grown and ready for sale, and together with the cages were worth $20,000, according to the Maine Marine Patrol. "This is a devastating situation for a small businessman," said Marine Patrol Sgt. Matthew Sinclair.
US news
Information security
fromComputerWeekly.com
2 months ago

Top 10 cyber security stories of 2025 | Computer Weekly

AI dominated cybersecurity headlines while pandemic-driven shifts, remote work, supply chain security, quantum threats to encryption, and US policy changes shaped 2025 priorities.
fromNextgov.com
2 months ago

Sen. Cotton urges top White House cyber official to protect open-source software

The chairman of the Senate Intelligence Committee asked National Cyber Director Sean Cairncross in a Wednesday letter to take steps to address vulnerabilities in open-source software projects that help power many systems used in U.S. military and civilian agencies. Sen. Tom Cotton, R-Ark., said he remains concerned about instances of open-source tools that received contributions from foreign adversaries like China and Russia.
US politics
Public health
fromThe Cipher Brief
2 months ago

America's Antibiotic Weakness Is a National Security Blindspot

Offshoring antibiotic production to China and India has eliminated U.S. onshore fermentation capacity, creating health security and supply access risks for essential antibiotics.
#npm
fromInfoWorld
4 months ago
Information security

Malicious npm packages contain Vidar infostealer

Malicious npm packages delivered Vidar infostealer via postinstall scripts, remained on the registry for about two weeks, and were downloaded over 2,240 times.
fromThe Hacker News
5 months ago
Information security

GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

GitHub will strengthen npm publishing by requiring FIDO 2FA, short-lived granular tokens, trusted OIDC publishing, and deprecating legacy tokens to prevent supply chain attacks.
#pypi
US politics
from24/7 Wall St.
3 months ago

Trump's Tariffs Led These 2 Companies To Invest Billions in The US

Tariff policy spurred reshoring and incentivized domestic manufacturing in pharmaceuticals and other sectors through exemptions for US-based production.
#data-breach
fromTechzine Global
3 months ago

SolarWinds lawsuit dropped: CISOs can breathe a sigh of relief

A lawsuit brought by the US Securities & Exchange Commission (SEC) against SolarWinds has been dropped. The legal fire was also directed at the company's CISO, Timothy G. Brown. Brown's alleged personal responsibility will now not be determined in court. It therefore appears that CISOs have less to fear from the law than previously thought. CISOs are responsible for securing their company's IT infrastructure.
Information security
fromTheregister
3 months ago

Countries use cyber targeting to plan strikes: Amazon CSO

This represents a "new operational model that's neither traditional cyber attack nor conventional warfare," Amazon Chief Security Officer Steve Schmidt told The Register. "The targeting data collected through cyber means flows directly into kinetic decision making."
Information security
fromIT Pro
3 months ago

'Slopsquatting' is a new risk for vibe coding developers - but it can be solved by focusing on the fundamentals

Slopsquatting is an attack method in which hackers exploit common AI hallucinations to trick engineers into mistakenly installing malicious packages. In short, hackers track non-existent packages hallucinated by AI coding tools and then publish malicious packages under these names on public repositories such as . The seemingly legitimate packages are then installed by victims who trust their AI code suggestions.
Information security
fromThe Washington Post
3 months ago

Congressional committee urges swift action on escalating Chinese threats

An influential bipartisan congressional commission is urging lawmakers to create a new economic statecraft office to enforce U.S. sanctions, limit Chinese influence in the electrical grid, and release funding to maintain dominance in cyber and quantum technologies - warning that the national security threat from Beijing has escalated over the past year and could threaten the United States in a future conflict.
US politics
Miscellaneous
fromwww.theguardian.com
3 months ago

It's a wake-up call': Dutch row with Chinese chipmaker that threatened global car industry

Dutch intervention to control Chinese-owned chipmaker Nexperia exposed Europe’s dependency on Chinese semiconductors and risked disrupting global automotive supply chains.
fromThe Cipher Brief
4 months ago

Former GCHQ Chief: Cybersecurity, AI, and the New Age of Multilateral Defense

I think the big cyber incidents happening in the Middle East and Europe in recent months, particularly ransomware as a service, so big names like Jaguar Land Rover and others, have kind of given this meeting an extra buzz just before we met. Quite a few people flew in from that have been affected by the supply chain attack on baggage handling software. So it was very relevant and topical.
Information security
fromwww.theguardian.com
4 months ago

Danish authorities in rush to close security loophole in Chinese electric buses

Authorities in Denmark are urgently studying how to close an apparent security loophole in hundreds of Chinese-made electric buses that enables them to be remotely deactivated. The investigation comes after transport authorities in Norway, where the Yutong buses are also in service, found that the Chinese supplier had remote access for software updates and diagnostics to the vehicles' control systems which could be exploited to affect buses while in transit.
Miscellaneous
Node JS
fromMedium
4 months ago

How to Setup React Storybook (v9) with pNPM For Advanced-To-Beginner React Developers?

PNPM provides faster, more consistent installs and enhances supply-chain security by disabling automatic postinstall scripts in dependencies starting with version 10.
World news
fromAxios
4 months ago

China has been an "unreliable partner" in many ways, Bessent says

The US-China framework trade deal may be temporary, postponing rather than resolving trade tensions, especially around rare earths and export controls.
Fundraising
fromArs Technica
4 months ago

Python plan to boost software security foiled by Trump admin's anti-DEI rules

The Python Software Foundation withdrew its NSF grant application because NSF DEI restrictions conflicted with its mission and would forbid DEI programming.
#ransomware
from24/7 Wall St.
4 months ago

Despite Trump Administration Denials, Quantum Stocks Keep Leaping Higher

Quantum computing stocks continue to rebound following a Wall Street Journal article yesterday detailing potential U.S. government equity investments in the sector. The report outlined early discussions with the Commerce Dept., where firms could trade shares for at least $10 million each in federal funds. The story ignited investor excitement after consecutive days of declining stock prices, with QBTS, RGTI, IONQ, and QUBT all racing higher by double-digit percentages.
Business
Information security
fromTheregister
4 months ago

Vulnerable Rust crate exposes uv Python packager

A header-parsing flaw in async-tar lets attackers smuggle files in tar archives, enabling overwrites and supply-chain attacks; popular fork tokio-tar remains unpatched.
Information security
fromThe Hacker News
4 months ago

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

A TAR parsing vulnerability (CVE-2025-62518) in async-tar and forks can enable remote code execution via file-overwrite; migrate from tokio-tar to patched astral-tokio-tar 0.5.6.
#rubygems
fromThe Hacker News
4 months ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
Information security
fromThe Hacker News
5 months ago

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely - Patch Now

A command injection vulnerability in the figma-developer-mcp MCP server (CVE-2025-53967) permits remote code execution via unsanitized user input.
fromTechzine Global
5 months ago

Red Hat hit by GitHub breach: 570GB stolen, including client info

Data from 28,000 internal projects at Red Hat has been stolen. The hacker group Crimson Collective claims to have stolen nearly 570GB of data. The stolen information is not only affecting Red Hat: BleepingComputer reports that customer data from around 800 Customer Engagement Reports has also been stolen. The hackers claim that the breach took place around two weeks ago. Customer Engagement Reports (CERs) are documents that contain infrastructure details, configuration data, authentication keys, and other sensitive customer information.
Information security
DevOps
fromfaun.pub
5 months ago

SBOM-Driven Deployments: Blocking Builds Without Verified Dependencies

Generate and enforce SBOMs in CI/CD to block risky dependencies and prevent supply chain breaches.
fromWIRED
5 months ago

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

New research released this week shows that over the past few years the US Department of Homeland Security has collected DNA data of nearly 2,000 US citizens. The activity raises questions about legality and oversight given that DHS has been putting the information into an FBI crime database. Some of the genetic data is from US citizens as young as 14.
Information security
Information security
fromTechzine Global
5 months ago

Malware in MCP server reveals fundamental security problem

Unvetted AI ecosystem components can be compromised to exfiltrate sensitive data, turning trusted, widely used tools into invisible backdoors that bypass security controls.
fromZero Day Initiative
5 months ago

Zero Day Initiative - CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin

For Developers: * Never use pickle for untrusted data: This cannot be emphasized enough. * Never assume checkpoint files are safe: Checkpoint deserialization is vulnerable to supply chain attacks. * Always use weights_only=True when using PyTorch's load functions. * Restrict to trusted classes: Restrict deserialization to only trusted classes. * Implement defense in depth: Don't rely on a single security measure. * Consider alternative formats: Safetensors, ONNX, or other secure serialization formats should all be considered.
Information security
fromZDNET
5 months ago

This 'critical' Cursor security flaw could expose your code to malware - how to fix it

"This has the potential to leak sensitive credentials, modify files, or serve as a vector for broader system compromise, placing Cursor users at significant risk from supply chain attacks," Oasis wrote. While Cursor and other AI-powered coding tools like Claude Code and Windsurf have become popular among software developers, the technology is still fraught with bugs. Replit, another AI coding assistant that debuted its newest agent earlier this week, recently deleted a user's entire database.
Information security
Software development
fromDevOps.com
5 months ago

Nominations Are Open: DevOps Dozen 2025 - DevOps.com

Nominations are open for the DevOps Dozen awards recognizing community leaders and tools across 24 categories emphasizing AI, platform engineering, and supply-chain security.
Information security
fromInfoQ
6 months ago

Researcher Unearths Thousands of Leaked Secrets in GitHub's "Oops Commits"

GitHub public commits remain archived after force pushes, exposing thousands of secrets including high-value tokens and admin-level credentials.
#contact-form-phishing
Information security
fromInfoWorld
6 months ago

8 vendors bringing AI to devsecops and application security

AI is becoming foundational to software security, enabling automated vulnerability remediation, real-time secure coding, and supply-chain hardening while introducing governance and risk challenges.
fromDevOps.com
6 months ago

Tackling the DevSecOps Gap in Software Understanding - DevOps.com

Let's dig into what this really means, why it matters, and where we go from here. But then I thought a bit more. It's not just necessary-it's overdue. And not only for national security systems. This gap in software understanding exists across nearly every enterprise and agency in the public and private sector. The real challenge is not recognizing the problem. It's addressing it early, systemically and sustainably-especially in a DevSecOps context.
DevOps
Software development
fromInfoQ
6 months ago

Supply Chain Security: Provenance Tools Becoming Standard in Developer Platforms

Software provenance is essential for securing supply chains and ensuring compliance with regulations like SLSA.
Health
fromMedCity News
6 months ago

Trump's Push for U.S. Drug Manufacturing Expands to Pharma Ingredients With New Executive Order - MedCity News

The Trump administration's new executive order aims to stockpile active pharmaceutical ingredients (APIs) to enhance U.S. drug manufacturing security.
Artificial intelligence
fromFortune
7 months ago

Former Intel board members: America's champion is likely to retreat, and we still need a leading-edge chip manufacturer

The U.S. must prioritize American-owned semiconductor manufacturing to secure its supply chains and technological supremacy in AI and critical technologies.
fromThe Hacker News
8 months ago

5 Ways Identity-based Attacks Are Breaching Retail

Adidas confirmed a data breach caused by an attack on a third-party customer service provider. The company said customer data was exposed, including names, email addresses, and order details.
Privacy professionals
[ Load more ]