#supply-chain-security

[ follow ]
fromThe Hacker News
3 weeks ago

5 Ways Identity-based Attacks Are Breaching Retail

Adidas confirmed a data breach caused by an attack on a third-party customer service provider. The company said customer data was exposed, including names, email addresses, and order details.
Privacy professionals
fromwww.theguardian.com
1 month ago

Quad countries agree to diversify critical mineral supplies amid China concerns

The four countries said in a joint statement that they were establishing the Quad Critical Minerals Initiative, aimed at collaborating on securing and diversifying supply chains.
US politics
#cybersecurity
fromHackernoon
2 years ago
Privacy professionals

Decentralized Public-Key Infrastructure: The Future of Supply Chain Security | HackerNoon

Information security
fromIT Pro
2 months ago

Two more NHS Trusts have been hit with cyber attacks - here's what we know so far

Cyber attacks on NHS trusts emphasize the urgent need for improved supply chain security practices.
fromHackernoon
2 years ago
Privacy professionals

Decentralized Public-Key Infrastructure: The Future of Supply Chain Security | HackerNoon

fromIT Pro
2 months ago
Information security

Two more NHS Trusts have been hit with cyber attacks - here's what we know so far

fromIT Pro
1 month ago

Developers beware: Malware has been found in a dozen popular NPM packages - here's what you need to know

Over a dozen NPM packages have been compromised, delivering malware that allows attackers to control infected machines.
Growth hacking
fromThe Hacker News
1 month ago

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

Malicious packages in multiple repositories have been discovered, posing significant security threats in open-source ecosystems.
fromDeveloper Tech News
2 months ago

Chainguard rebuilds Python libraries to slam the door on malware

Chainguard Libraries for Python represents a significant leap towards malware resistance, as it securely builds Python dependencies from their original source code in a robust infrastructure.
Web frameworks
fromInfoWorld
1 year ago

GitHub Artifact Attestations sign and verify software artifacts

GitHub introduced Artifact Attestations for securing software supply chains in GitHub Actions.
fromArs Technica
3 months ago

AI-generated code could be a disaster for the software supply chain. Here's why.

LLM-generated code increases vulnerability to supply-chain attacks due to the inclusion of non-existent dependencies.
fromDevOps.com
4 months ago

GitHub Action Compromise Risks Data Leaks for 23,000 Repositories - DevOps.com

A widely used GitHub Action has been compromised to leak sensitive information from public repositories.
Privacy technologies
fromTechRepublic
4 months ago

Billions of Devices at Risk of Hacking Due to Hidden Commands

Undocumented commands in the ESP32 Bluetooth chip pose serious security risks, enabling potential impersonation and memory manipulation.
[ Load more ]