supply chain security

Rowing in the Same Direction: 6 Tips for Stronger IT and Security Collaboration
John D. Boyle | | AI, Fleet Management, IT, NPU, risk management, security, supply chain security, XPU, zero trust
Each IT and security team has its function, but unless they row in unison — aligning on strategy, focus and execution — the organization will flounder ...
Security Boulevard

The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security
This post covers the attack flow, how it happened, and the importance of supply chain security ...

Securing the Software Supply Chain: Checkmarx One Expands its Offerings
The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to ...
Security Boulevard
The Supply Chain Conspiracy: Cyber Attacks Behind the Lebanon Explosions
On September 17 and 18, a series of devastating explosions rocked Lebanon, resulting in 37 fatalities and nearly 3,000 injuries, according to the Lebanese Minister of Public Health. Initial investigations suggest these ...
Dependency Confusion Attacks and Prevention: Register Your Private Package Names
Dependency confusion attacks exploit gaps in your software supply chain. Dive into modern dependency management and learn how to defend your systems with best practices ...

Networking Equipment Riddled With Software Supply Chain Risks
Nathan Eddy | | CVE, IT network, IT Security, networking, router, SBOM, supply chain security, switch, vulnerability
Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors ...
Security Boulevard
Researchers Uncover UEFI Vulnerability Affecting Intel CPUs
Wajahat Raja | | Code execution within UEFI firmware, Cybersecurity News, Malicious code execution, Phoenix SecureCore UEFI firmware, supply chain security, Trusted Platform Module (TPM) configuration
Cybersecurity researchers have recently uncovered a UEFI vulnerability in the Phoenix SecureCore UEFI firmware, which affects a variety of Intel Core desktop and mobile processors. This now-patched vulnerability, identified as CVE-2024-0762 with ...

More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices ...

Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric)
This blog is based on our conversation with Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric. It covers the unique challenges of software supply chain security ...
Threat Hunting 101: Five Common Threats to Look For
Learn more about supply chain threats and where to find them ...