#supply-chain-security

[ follow ]
fromDeveloper Tech News
6 days ago

Chainguard rebuilds Python libraries to slam the door on malware

Chainguard Libraries for Python represents a significant leap towards malware resistance, as it securely builds Python dependencies from their original source code in a robust infrastructure.
Web frameworks
#cybersecurity
US news
fromSecuritymagazine
2 months ago

Cyber operations against Russia halted, cyber leaders remain alert

The U.S. has suspended offensive cyber operations against Russia, raising concerns among cybersecurity experts and organizations.
Organizations must enhance their cybersecurity measures, particularly in securing supply chains, amidst the suspension.
Node JS
fromThe Hacker News
1 month ago

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Three malicious npm packages disguised as a Telegram bot library have been found, containing SSH backdoors and data exfiltration functionalities.
Information security
fromThe Hacker News
1 month ago

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

Several legitimate cryptocurrency packages on npm have been hijacked to steal sensitive information from compromised systems.
Artificial intelligence
fromTheregister
6 days ago

Infosec pros still aren't nailing the basics of AI security

Many organizations are using generative AI without understanding the associated security risks.
The NCSC warns that critical systems may be vulnerable to AI-empowered attackers by 2027.
Ignoring AI integration in cyber defenses raises business risk.
Information security
fromHackernoon
1 year ago

Breaking the Chain: How Scribe Security is Redefining Software Supply Chain Protection | HackerNoon

Software supply chain attacks exploit vulnerabilities in the development lifecycle, resulting in severe organizational risks.
Scribe Security's new platform strengthens security without compromising development speed.
US news
fromSecuritymagazine
2 months ago

Cyber operations against Russia halted, cyber leaders remain alert

The U.S. has suspended offensive cyber operations against Russia, raising concerns among cybersecurity experts and organizations.
Organizations must enhance their cybersecurity measures, particularly in securing supply chains, amidst the suspension.
Node JS
fromThe Hacker News
1 month ago

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Three malicious npm packages disguised as a Telegram bot library have been found, containing SSH backdoors and data exfiltration functionalities.
Information security
fromThe Hacker News
1 month ago

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

Several legitimate cryptocurrency packages on npm have been hijacked to steal sensitive information from compromised systems.
Artificial intelligence
fromTheregister
6 days ago

Infosec pros still aren't nailing the basics of AI security

Many organizations are using generative AI without understanding the associated security risks.
The NCSC warns that critical systems may be vulnerable to AI-empowered attackers by 2027.
Ignoring AI integration in cyber defenses raises business risk.
Information security
fromHackernoon
1 year ago

Breaking the Chain: How Scribe Security is Redefining Software Supply Chain Protection | HackerNoon

Software supply chain attacks exploit vulnerabilities in the development lifecycle, resulting in severe organizational risks.
Scribe Security's new platform strengthens security without compromising development speed.
fromInfoWorld
10 months ago

GitHub Artifact Attestations sign and verify software artifacts

By using Artifact Attestations in GitHub Actions workflows, developers can improve security and protect against supply chain attacks and unauthorized modifications.
DevOps
Privacy technologies
fromTechRepublic
2 months ago

Billions of Devices at Risk of Hacking Due to Hidden Commands

Undocumented commands in the ESP32 Bluetooth chip pose serious security risks, enabling potential impersonation and memory manipulation.
[ Load more ]