#supply-chain-security

[ follow ]
Java
fromInfoWorld
8 hours ago

Oracle unveils the Java Verified Portfolio

Oracle's Java portfolio simplifies licensing and roadmap management by separating core JDK from portfolio offerings, centralizing tool access, and enhancing supply chain integrity with governance support.
Intellectual property law
fromAxios
1 day ago

Tech industry rallies behind Anthropic in Pentagon fight

Major tech industry groups filed a court brief opposing the Pentagon's designation of Anthropic as a supply chain risk, arguing the government misused national security authorities in a contractor dispute.
Information security
fromThe Hacker News
1 day ago

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

GlassWorm malware campaign uses stolen GitHub tokens to inject malicious code into Python repositories, triggering infections when developers install or execute compromised code.
#vs-code-extensions
fromInfoWorld
1 day ago
Software development

Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse

Software development
fromInfoWorld
1 day ago

Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse

Malicious VS Code extensions impersonate legitimate developer tools like ESLint, Prettier, and AI coding assistants to infiltrate systems through the Open VSX marketplace.
Java
fromInfoQ
1 day ago

Andres Almiray on How to Release Any Software to Any OS with JReleaser

Andres Almiray, a Java Champion with 20 years of open-source contributions, developed JReleaser as a CLI tool addressing supply chain security, reproducible builds, and release automation in the Java ecosystem.
fromFortune
5 days ago

Anthropic just sued the Pentagon. The outcome could reshape the AI race with China | Fortune

Supposedly, Anthropic refused to give the Pentagon unrestricted access to Claude, its frontier AI model, the only one currently running on classified military networks. They wanted guarantees that there would be zero mass surveillance and no autonomous weapons without a human in the loop, making the final decisions of life or death. The Department of War's message was 'remove those restrictions or lose everything.'
US politics
#rare-earth-elements
fromFortune
6 days ago
World politics

Beijing's dominance in rare earth processing leaves others scrambling to close the gap: 'China is the leader, and the U.S. is far behind' | Fortune

China controls approximately 90% of global rare earth processing capacity, giving Beijing significant geopolitical leverage over critical industries including defense, semiconductors, and electric vehicles.
fromThe Mercury News
1 week ago
US politics

Kounalakis: Trump's attacks on California condemn America to dependency on China

Rare earth elements control modern technology supply chains; China dominates 80% of global production, creating critical U.S. security vulnerability that requires domestic solutions rather than foreign policy coercion.
World politics
fromFortune
6 days ago

Beijing's dominance in rare earth processing leaves others scrambling to close the gap: 'China is the leader, and the U.S. is far behind' | Fortune

China controls approximately 90% of global rare earth processing capacity, giving Beijing significant geopolitical leverage over critical industries including defense, semiconductors, and electric vehicles.
#ai-regulation
Intellectual property law
fromABC7 Los Angeles
1 week ago

Anthropic sues Trump administration seeking to undo 'supply chain risk' designation

Anthropic sued the Trump administration to overturn the Pentagon's designation of the company as a supply chain risk, challenging restrictions on military use of its AI technology.
Artificial intelligence
fromTechzine Global
1 week ago

Pentagon labels Anthropic a supply chain risk

The US Department of Defense designated Anthropic as a supply chain risk over disagreements about military use of Claude AI, particularly regarding mass surveillance and autonomous weapons restrictions.
Intellectual property law
fromwww.mercurynews.com
1 week ago

Anthropic sues Trump administration seeking to undo supply chain risk' designation

Anthropic sued the Trump administration to reverse the Pentagon's supply chain risk designation, arguing the government unlawfully punished the company for refusing unrestricted military use of its AI technology.
Intellectual property law
fromThe Verge
1 week ago

Anthropic is suing the Department of Defense

Anthropic sued the Trump administration for illegally designating it a supply-chain risk and ordering government agencies to cease using its technology, claiming retaliation for refusing mass surveillance and autonomous weapons applications.
Intellectual property law
fromABC7 Los Angeles
1 week ago

Anthropic sues Trump administration seeking to undo 'supply chain risk' designation

Anthropic sued the Trump administration to overturn the Pentagon's designation of the company as a supply chain risk, challenging restrictions on military use of its AI technology.
fromwww.bbc.com
1 week ago

Anthropic labelled a supply chain risk by Pentagon

From the very beginning, this has been about one fundamental principle: the military being able to use technology for all lawful purposes. The military will not allow a vendor to insert itself into the chain of command by restricting the lawful use of a critical capability and put our warfighters at risk.
Artificial intelligence
#cybersecurity
Intellectual property law
fromTechCrunch
2 weeks ago

Tech workers urge DOD, Congress to withdraw Anthropic label as a supply chain risk | TechCrunch

Tech workers oppose DOD's designation of Anthropic as a supply chain risk following the AI company's refusal to grant unrestricted military access to its systems.
Information security
fromTechzine Global
2 weeks ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromAxios
2 weeks ago

Trump moves to blacklist Anthropic over AI fight with Pentagon

The Pentagon put its ultimatum in writing on Wednesday night, reiterating its demand that Anthropic agree to let the military use its technology for "all lawful purposes." Anthropic CEO Dario Amodei responded with a public statement laying out the company's concerns and stating "we cannot in good conscience accede to their request."
US politics
Information security
fromThe Hacker News
2 weeks ago

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

A malicious NuGet package named StripeApi.Net impersonated Stripe's legitimate library to steal financial sector developers' API tokens and sensitive data.
fromBusiness Insider
2 weeks ago

How the Pentagon picks what drones to buy in a Chinese-dominated market

The push reflects a broader Pentagon effort to field large numbers of low-cost drones quickly without creating new dependencies that could backfire in a fight. The Blue UAS [Uncrewed Aerial Systems] List provides service branches and federal agencies with a catalog of approved drones they can buy.
US news
Information security
fromThe Hacker News
2 weeks ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
Information security
fromSecurityWeek
2 weeks ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
World news
fromwww.aljazeera.com
3 weeks ago

Calculated hypocrisy: Why Western powers court Beijing but rely on US

Western economic engagement with China reflects pragmatic economic diversification and strategic hedging, not a strategic realignment away from the United States.
Information security
fromInfoWorld
3 weeks ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
Startup companies
fromTechCrunch
4 weeks ago

SpaceX vets raise $50M Series A for data center links | TechCrunch

Mesh Optical Technologies will mass-produce optical transceivers to supply AI data centers, reducing reliance on Chinese-dominated supply chains.
EU data protection
fromTechzine Global
4 weeks ago

Trusted Tech Alliance establishes five principles for secure technology

Sixteen global tech companies formed the Trusted Tech Alliance to embed transparency, security, and data protection across the entire technology stack.
#third-party-risk
#critical-minerals
fromFortune
1 month ago
US politics

Metals are the new oil, JD Vance pitches to America: 'There's no realer thing than critical minerals' | Fortune

fromTechCrunch
1 month ago
US politics

Trump's critical mineral reserve is an admission that the future is electric | TechCrunch

fromAxios
2 months ago
US politics

Exclusive: Bipartisan plan in Congress aims to create U.S. reserve for critical minerals

fromFortune
1 month ago
US politics

Metals are the new oil, JD Vance pitches to America: 'There's no realer thing than critical minerals' | Fortune

fromTechCrunch
1 month ago
US politics

Trump's critical mineral reserve is an admission that the future is electric | TechCrunch

fromAxios
2 months ago
US politics

Exclusive: Bipartisan plan in Congress aims to create U.S. reserve for critical minerals

JavaScript
fromInfoWorld
1 month ago

Beyond NPM: What you need to know about JSR

The JavaScript Registry simplifies and secures JavaScript package creation, distribution, and consumption while addressing NPM's TypeScript complexity and provenance shortcomings.
#rare-earths
#rare-earth-minerals
Information security
fromThe Hacker News
1 month ago

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Eclipse Foundation will require pre-publish security checks on Open VSX Registry VS Code extensions to proactively prevent malicious or compromised extensions.
Information security
fromSecurityWeek
1 month ago

Critical React Native Vulnerability Exploited in the Wild

Critical CVE-2025-11953 (Metro4Shell) in React Native's Community CLI/Metro is being actively exploited since December, exposing thousands of internet-accessible instances.
US politics
fromThe Cipher Brief
1 month ago

The U.S.-China Economic Cold War Is No Longer Silent

U.S. outsourced critical industry, losing semiconductor and rare-earth leadership; China militarizes economic assets, prompting a U.S. economic war cabinet and an Economic Defense Unit.
fromEntrepreneur
1 month ago

The Only Crew with Access to a $450 Million 'Gold Rush'

But after decades of outsourcing tungsten production, the federal government has now begun restricting imports. United States Tungsten founders Stacy Hastie and Randy Waterfield saw this coming. They're reviving what was once America's largest tungsten mine, the Tungsten Queen. It's a site holding an estimated 1 million tons of tungsten with an in-ground value approaching $450 million, the company says. And it says it is already in talks with the U.S. Government.
Venture
Information security
fromTechzine Global
1 month ago

AI hallucinates in 28 percent of dependency upgrades

AI dependency-upgrade recommendations often reference non-existent or dangerous package versions, causing broken pipelines, wasted developer time, and increased supply‑chain risk.
fromInfoWorld
1 month ago

Unplugged holes in the npm and yarn package managers could let attackers bypass defenses against Shai-Hulud

saving lockfile integrity checks (package-lock.json, pnpm-lock.yaml, and others) to version control (git). The lockfile records the exact version and integrity hash of every package in a dependency tree. On subsequent installs, the package manager checks incoming packages against these hashes, and if something doesn't match, installation fails. If an attacker compromises a package and pushes a malicious version, the integrity check should catch the mismatch and block it from being installed.
Information security
Information security
fromInfoWorld
1 month ago

GitLab 2FA login protection bypass lets attackers take over accounts

A critical 2FA bypass (CVE-2026-0723) in GitLab Community and Enterprise requires immediate patching to prevent account compromise and supply-chain attacks.
fromTheregister
1 month ago

EU mulls axing Chinese kit from networks within 3 years

Europe faces increasingly sophisticated hybrid attacks on every area of its infrastructure, the EC claims. The revised Cybersecurity Act looks to address this with union-level risk assessments, combined with targeted mitigation measures that will include bans on IT components from "high-risk suppliers." The suggested timeframe for this could leave member states with as little as three years to remove non-compliant kit.
Miscellaneous
Information security
fromTheregister
1 month ago

Best of British: UK's infosec envoys are mostly US firms

UK government appointed company ambassadors to promote the Software Security Code of Practice, aiming to improve software supply chain security, commercial trust, and cyber defenses.
Python
fromPython Software Foundation Blog
2 months ago

Anthropic invests $1.5 million in the Python Software Foundation and open source security

Anthropic funds PSF $1.5M over two years to strengthen Python ecosystem security, improve CPython and PyPI defenses, and develop proactive malware-detection tools.
fromComputerWeekly.com
2 months ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
fromTheregister
2 months ago

Brussels plots open source push to pry Europe off Big Tech

The European Commission has launched a fresh consultation into open source, setting out its ambitions for Europe's developer communities to go beyond propping up US tech giants' platforms. In a "Call for Evidence" published this week, Brussels says the EU's reliance on non-European technology suppliers (read: US tech giants) has become a strategic liability, limiting choice, weakening competitiveness, and creating supply chain risks across everything from cloud services to critical infrastructure.
Miscellaneous
fromPythonbytes
2 months ago

Malicious Package? No Build For You!

Charlie Marsh announced the Beta release of ty on Dec 16 "designed as an alternative to tools like mypy, Pyright, and Pylance." Extremely fast even from first run Successive runs are incremental, only rerunning necessary computations as a user edits a file or function. This allows live updates.
DevOps
fromThe Hacker News
2 months ago

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations

As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust, and execution speed. This report examines how core areas of cybersecurity are evolving in response to that shift. Across authentication, endpoint security, software supply chain protection, network visibility, and human risk, it explores how defenders are adapting to adversaries that move faster, blend technical and social techniques, and exploit gaps between systems rather than weaknesses in any single control.
Artificial intelligence
fromFortune
2 months ago

Seafood thieves snatch $400,000 of lobster, plus oysters and crabs, in round of New England robberies | Fortune

The first seafood vanished on Nov. 22 in Falmouth, Maine, where authorities suspect someone stole 14 cages full of oysters from an aquaculture site in Casco Bay. Many of the oysters were full-grown and ready for sale, and together with the cages were worth $20,000, according to the Maine Marine Patrol. "This is a devastating situation for a small businessman," said Marine Patrol Sgt. Matthew Sinclair.
US news
Information security
fromComputerWeekly.com
2 months ago

Top 10 cyber security stories of 2025 | Computer Weekly

AI dominated cybersecurity headlines while pandemic-driven shifts, remote work, supply chain security, quantum threats to encryption, and US policy changes shaped 2025 priorities.
fromNextgov.com
2 months ago

Sen. Cotton urges top White House cyber official to protect open-source software

The chairman of the Senate Intelligence Committee asked National Cyber Director Sean Cairncross in a Wednesday letter to take steps to address vulnerabilities in open-source software projects that help power many systems used in U.S. military and civilian agencies. Sen. Tom Cotton, R-Ark., said he remains concerned about instances of open-source tools that received contributions from foreign adversaries like China and Russia.
US politics
Public health
fromThe Cipher Brief
3 months ago

America's Antibiotic Weakness Is a National Security Blindspot

Offshoring antibiotic production to China and India has eliminated U.S. onshore fermentation capacity, creating health security and supply access risks for essential antibiotics.
#npm
#pypi
US politics
from24/7 Wall St.
3 months ago

Trump's Tariffs Led These 2 Companies To Invest Billions in The US

Tariff policy spurred reshoring and incentivized domestic manufacturing in pharmaceuticals and other sectors through exemptions for US-based production.
#data-breach
fromTechzine Global
3 months ago

SolarWinds lawsuit dropped: CISOs can breathe a sigh of relief

A lawsuit brought by the US Securities & Exchange Commission (SEC) against SolarWinds has been dropped. The legal fire was also directed at the company's CISO, Timothy G. Brown. Brown's alleged personal responsibility will now not be determined in court. It therefore appears that CISOs have less to fear from the law than previously thought. CISOs are responsible for securing their company's IT infrastructure.
Information security
fromTheregister
3 months ago

Countries use cyber targeting to plan strikes: Amazon CSO

This represents a "new operational model that's neither traditional cyber attack nor conventional warfare," Amazon Chief Security Officer Steve Schmidt told The Register. "The targeting data collected through cyber means flows directly into kinetic decision making."
Information security
fromIT Pro
3 months ago

'Slopsquatting' is a new risk for vibe coding developers - but it can be solved by focusing on the fundamentals

Slopsquatting is an attack method in which hackers exploit common AI hallucinations to trick engineers into mistakenly installing malicious packages. In short, hackers track non-existent packages hallucinated by AI coding tools and then publish malicious packages under these names on public repositories such as . The seemingly legitimate packages are then installed by victims who trust their AI code suggestions.
Information security
fromThe Washington Post
3 months ago

Congressional committee urges swift action on escalating Chinese threats

An influential bipartisan congressional commission is urging lawmakers to create a new economic statecraft office to enforce U.S. sanctions, limit Chinese influence in the electrical grid, and release funding to maintain dominance in cyber and quantum technologies - warning that the national security threat from Beijing has escalated over the past year and could threaten the United States in a future conflict.
US politics
Miscellaneous
fromwww.theguardian.com
4 months ago

It's a wake-up call': Dutch row with Chinese chipmaker that threatened global car industry

Dutch intervention to control Chinese-owned chipmaker Nexperia exposed Europe’s dependency on Chinese semiconductors and risked disrupting global automotive supply chains.
fromThe Cipher Brief
4 months ago

Former GCHQ Chief: Cybersecurity, AI, and the New Age of Multilateral Defense

I think the big cyber incidents happening in the Middle East and Europe in recent months, particularly ransomware as a service, so big names like Jaguar Land Rover and others, have kind of given this meeting an extra buzz just before we met. Quite a few people flew in from that have been affected by the supply chain attack on baggage handling software. So it was very relevant and topical.
Information security
fromwww.theguardian.com
4 months ago

Danish authorities in rush to close security loophole in Chinese electric buses

Authorities in Denmark are urgently studying how to close an apparent security loophole in hundreds of Chinese-made electric buses that enables them to be remotely deactivated. The investigation comes after transport authorities in Norway, where the Yutong buses are also in service, found that the Chinese supplier had remote access for software updates and diagnostics to the vehicles' control systems which could be exploited to affect buses while in transit.
Miscellaneous
Node JS
fromMedium
4 months ago

How to Setup React Storybook (v9) with pNPM For Advanced-To-Beginner React Developers?

PNPM provides faster, more consistent installs and enhances supply-chain security by disabling automatic postinstall scripts in dependencies starting with version 10.
World news
fromAxios
4 months ago

China has been an "unreliable partner" in many ways, Bessent says

The US-China framework trade deal may be temporary, postponing rather than resolving trade tensions, especially around rare earths and export controls.
Fundraising
fromArs Technica
4 months ago

Python plan to boost software security foiled by Trump admin's anti-DEI rules

The Python Software Foundation withdrew its NSF grant application because NSF DEI restrictions conflicted with its mission and would forbid DEI programming.
#ransomware
from24/7 Wall St.
4 months ago

Despite Trump Administration Denials, Quantum Stocks Keep Leaping Higher

Quantum computing stocks continue to rebound following a Wall Street Journal article yesterday detailing potential U.S. government equity investments in the sector. The report outlined early discussions with the Commerce Dept., where firms could trade shares for at least $10 million each in federal funds. The story ignited investor excitement after consecutive days of declining stock prices, with QBTS, RGTI, IONQ, and QUBT all racing higher by double-digit percentages.
Business
Information security
fromTheregister
4 months ago

Vulnerable Rust crate exposes uv Python packager

A header-parsing flaw in async-tar lets attackers smuggle files in tar archives, enabling overwrites and supply-chain attacks; popular fork tokio-tar remains unpatched.
Information security
fromThe Hacker News
4 months ago

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

A TAR parsing vulnerability (CVE-2025-62518) in async-tar and forks can enable remote code execution via file-overwrite; migrate from tokio-tar to patched astral-tokio-tar 0.5.6.
#rubygems
fromThe Hacker News
5 months ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
Information security
fromThe Hacker News
5 months ago

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely - Patch Now

A command injection vulnerability in the figma-developer-mcp MCP server (CVE-2025-53967) permits remote code execution via unsanitized user input.
fromTechzine Global
5 months ago

Red Hat hit by GitHub breach: 570GB stolen, including client info

Data from 28,000 internal projects at Red Hat has been stolen. The hacker group Crimson Collective claims to have stolen nearly 570GB of data. The stolen information is not only affecting Red Hat: BleepingComputer reports that customer data from around 800 Customer Engagement Reports has also been stolen. The hackers claim that the breach took place around two weeks ago. Customer Engagement Reports (CERs) are documents that contain infrastructure details, configuration data, authentication keys, and other sensitive customer information.
Information security
DevOps
fromfaun.pub
6 months ago

SBOM-Driven Deployments: Blocking Builds Without Verified Dependencies

Generate and enforce SBOMs in CI/CD to block risky dependencies and prevent supply chain breaches.
fromWIRED
5 months ago

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

New research released this week shows that over the past few years the US Department of Homeland Security has collected DNA data of nearly 2,000 US citizens. The activity raises questions about legality and oversight given that DHS has been putting the information into an FBI crime database. Some of the genetic data is from US citizens as young as 14.
Information security
Information security
fromTechzine Global
5 months ago

Malware in MCP server reveals fundamental security problem

Unvetted AI ecosystem components can be compromised to exfiltrate sensitive data, turning trusted, widely used tools into invisible backdoors that bypass security controls.
fromZero Day Initiative
5 months ago

Zero Day Initiative - CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin

For Developers: * Never use pickle for untrusted data: This cannot be emphasized enough. * Never assume checkpoint files are safe: Checkpoint deserialization is vulnerable to supply chain attacks. * Always use weights_only=True when using PyTorch's load functions. * Restrict to trusted classes: Restrict deserialization to only trusted classes. * Implement defense in depth: Don't rely on a single security measure. * Consider alternative formats: Safetensors, ONNX, or other secure serialization formats should all be considered.
Information security
fromZDNET
6 months ago

This 'critical' Cursor security flaw could expose your code to malware - how to fix it

"This has the potential to leak sensitive credentials, modify files, or serve as a vector for broader system compromise, placing Cursor users at significant risk from supply chain attacks," Oasis wrote. While Cursor and other AI-powered coding tools like Claude Code and Windsurf have become popular among software developers, the technology is still fraught with bugs. Replit, another AI coding assistant that debuted its newest agent earlier this week, recently deleted a user's entire database.
Information security
Software development
fromDevOps.com
6 months ago

Nominations Are Open: DevOps Dozen 2025 - DevOps.com

Nominations are open for the DevOps Dozen awards recognizing community leaders and tools across 24 categories emphasizing AI, platform engineering, and supply-chain security.
Information security
fromInfoQ
6 months ago

Researcher Unearths Thousands of Leaked Secrets in GitHub's "Oops Commits"

GitHub public commits remain archived after force pushes, exposing thousands of secrets including high-value tokens and admin-level credentials.
Information security
fromTechzine Global
6 months ago

ZipLine phishing campaign exploits trust in contact forms

ZipLine exploits website contact forms to initiate multi-week phishing, delivering MixShell malware in a malicious confidentiality document that uses DNS tunneling.
[ Load more ]