Supply Chain Attacks

HYCU Tackles SaaS Data Protection With New R-Shield Solution
HYCU introduces R-Shield to provide comprehensive cyber resilience across SaaS, cloud, and on-premises environments as organizations face growing supply chain attacks ...
Security Boulevard

Why the 2025 PyPI Attack Signals a New Era in Cloud Risk
MixMode Threat Research | | Blog, cyber attacks, Cyber-attack, Cybersecurity News, supply chain, Supply Chain Attacks, Threat Intelligence Research, Threat Research, Zero Day Attacks, zero-day attack
The 2025 PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and evolving threats ...

Why Supply Chain Attacks Are The Biggest Threat To Businesses?
In 2024, approximately 183,000 customers worldwide were affected by supply chain attacks. In terms of frequency, the software supply chain experienced one attack every 48 hours. Surprisingly, India is among the most ...

Securing development infrastructure: A new frontier in software supply chain security
Aaron Linskens | | development infrastructure, secure software supply chain, software supply chain, Supply Chain Attacks
Software supply chains are indispensable to modern software development as they drive innovation and efficiency across industries. Yet, as vital as they are, these supply chains are also avenues for threats and ...
CISA Alert: GitLab Password Exploit – Act Now For Protection
Wajahat Raja | | account takeover, cisa, CVE-2023-7028, Cybersecurity, Cybersecurity News, GitLab, Incident Response, Linux Infrastructure, Multi-Factor Authentication (MFA), Password Exploit, patch management, security best practices, Supply Chain Attacks, two-factor-authentication.2fa, Vulnerabilities
In the realm of cybersecurity, vigilance is paramount. Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) flagged a critical vulnerability in GitLab, a popular platform for collaborative software development. This GitLab ...
Evasive Panda Cyber Attacks: Threat Actor Targets Tibetans
Wajahat Raja | | Advanced persistent threat (APT), China-linked Hackers, cyber attacks, Cyber Espionage, Cybersecurity, Cybersecurity News, ESET, Evasive Panda, malicious code, Malware Tactics, MgBot, Monlam Festival, Nightdoor Backdoor, Supply Chain Attacks, threat actors, Tibetans, watering hole attacks
Cybersecurity experts at ESET have come across a malicious campaign that targets Tibetans in many countries by leveraging the website of a religious gathering. Evasive Panda cyber attacks are associated with a ...
How Can CIOs Prepare Their Organizations for Generative AI?
Nik Hewitt | | advice, AI, Best Practices, Cybersecurity, next gen security, security, Security Research, Supply Chain Attacks
Generative AI: A new challenge in preparing organizations and setting policies In our swiftly evolving and ‘somewhat spicey’ digital age, Chief Information Officers (CIOs) now find themselves at the helm of navigating ...
Bringing Fashion Industry Cybersecurity in Vogue
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, security, Security Research, Supply Chain Attacks, visibility, zero trust
Fashion industry cybersecurity needs to become a part of the industry fabric As the fashion industry looks to the future with digital innovation, the looming shadow of cybercrime threatens to unravel ...
The Principles for Package Repository Security: An Overview
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, File Integrity Monitoring, microsegmentation, next gen security, security, Security Research, Supply Chain Attacks, zero trust
What are the Principles for Package Repository Security, and how can organizations effectively protect their code supply chain? The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the the Open ...
How to Create a Cybersecurity Policy Document
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, Supply Chain Attacks, workloads, zero trust
Just as important as the right staff and software, an organization’s cybersecurity policy is the lynchpin of solid protection In the modern digital-centric workplace, the lines between professional and personal lives are ...