supply chain

North Korean Software Supply Chain Attack Hits North America, Asia 

North Korean Software Supply Chain Attack Hits North America, Asia  24/11/2023 at 15:46 By Eduard Kovacs North Korean hackers breached a Taiwanese company and used its systems to deliver malware to the US, Canada, Japan and Taiwan in a supply chain attack. The post North Korean Software Supply Chain Attack Hits North America, Asia  appeared […]

React to this headline:

Loading spinner

North Korean Software Supply Chain Attack Hits North America, Asia  Read More »

New horizons in cyber protection with 2024 trends to watch

New horizons in cyber protection with 2024 trends to watch 23/11/2023 at 08:02 By Help Net Security 2023 proved to be another challenging year for companies combating supply chain security and breaches. The 2024 outlook could be worse as attacks become increasingly sophisticated. In this Help Net Security video, Fei Huang, VP of Security Strategy

React to this headline:

Loading spinner

New horizons in cyber protection with 2024 trends to watch Read More »

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets 22/11/2023 at 20:31 By Ryan Naraine Researchers at Aqua call urgent attention to the public exposure of Kubernetes configuration secrets, warning that hundreds of organizations are vulnerable to this “ticking supply chain attack bomb.” The post Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets appeared first on

React to this headline:

Loading spinner

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets Read More »

CISOs vs. developers: A battle over security priorities

CISOs vs. developers: A battle over security priorities 13/11/2023 at 09:01 By Help Net Security A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, there is a clear disconnect and even some distrust between CISOs and developers

React to this headline:

Loading spinner

CISOs vs. developers: A battle over security priorities Read More »

US Government Issues Guidance on SBOM Consumption

US Government Issues Guidance on SBOM Consumption 10/11/2023 at 15:01 By Ionut Arghire CISA, NSA, and ODNI issue new guidance on managing open source software and SBOMs to maintain awareness on software security. The post US Government Issues Guidance on SBOM Consumption appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

US Government Issues Guidance on SBOM Consumption Read More »

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution 09/11/2023 at 15:48 By Ionut Arghire UK-based Risk Ledger has raised £6.25 million (~$7.65 million) in Series A funding to prevent supply chain attacks. The post Risk Ledger Raises £6.25 Million for Supply Chain Security Solution appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution Read More »

The double-edged sword of heightened regulation for financial services

The double-edged sword of heightened regulation for financial services 20/10/2023 at 06:04 By Help Net Security Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through extortion, theft, and fraud, according to Trustwave. In addition to the money itself, the financial services sector stores

React to this headline:

Loading spinner

The double-edged sword of heightened regulation for financial services Read More »

North Korean Hackers Exploiting Recent TeamCity Vulnerability

North Korean Hackers Exploiting Recent TeamCity Vulnerability 19/10/2023 at 14:01 By Ionut Arghire Multiple North Korean hacking groups have exploited a recent TeamCity vulnerability and Microsoft warns of potential supply chain attacks. The post North Korean Hackers Exploiting Recent TeamCity Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

North Korean Hackers Exploiting Recent TeamCity Vulnerability Read More »

Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol

Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol 05/10/2023 at 15:31 By Eduard Kovacs The Linux Foundation has announced OpenPubkey, an open source cryptographic protocol that should help boost supply chain security.  The post Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Linux Foundation Announces OpenPubkey Open Source Cryptographic Protocol Read More »

Tackling cyber risks head-on using security questionnaires

Tackling cyber risks head-on using security questionnaires 04/10/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments and accountability across all participants in the technology supply chain, fostering trust and safeguarding sensitive data. Many organizations

React to this headline:

Loading spinner

Tackling cyber risks head-on using security questionnaires Read More »

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers 21/09/2023 at 07:02 By Help Net Security 50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum. Security incidents involving industrial organizations have seen a sharp rise in recent years, with notable cases highlighting the vulnerabilities in

React to this headline:

Loading spinner

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers Read More »

How artificial intelligence can impact supply chains and logistics

How artificial intelligence can impact supply chains and logistics 12/09/2023 at 15:02 By Cointelegraph By Elizabeth Gail Many supply chain and logistics organizations are seeking AI-driven solutions to enhance their workflow efficiency. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

How artificial intelligence can impact supply chains and logistics Read More »

5 ways in which FHE can solve blockchain’s privacy problems

5 ways in which FHE can solve blockchain’s privacy problems 04/09/2023 at 08:02 By Help Net Security Blockchain technology has gained significant traction due to its decentralized nature and immutability, providing transparency and security for various applications, especially in finance. Having gained notoriety during the 2010s with the boom of cryptocurrencies such as Bitcoin, skilled

React to this headline:

Loading spinner

5 ways in which FHE can solve blockchain’s privacy problems Read More »

New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack

New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack 22/08/2023 at 14:33 By Ionut Arghire A new APT group called Carderbee has been observed deploying the PlugX backdoor via a supply chain attack targeting organizations in Hong Kong. The post New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack appeared first

React to this headline:

Loading spinner

New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack Read More »

Unraveling the importance of software supply chain security

Unraveling the importance of software supply chain security 07/08/2023 at 06:06 By Help Net Security The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers, vendors, developers, integrators, and users, making it susceptible to many potential

React to this headline:

Loading spinner

Unraveling the importance of software supply chain security Read More »

Strengthening the weakest links in the digital supply chain

Strengthening the weakest links in the digital supply chain 24/07/2023 at 07:05 By Help Net Security In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface that continues to expand to include a businesses’ entire digital supply chain. This is

React to this headline:

Loading spinner

Strengthening the weakest links in the digital supply chain Read More »

Supply chain executives unaware of growing customer trust issues

Supply chain executives unaware of growing customer trust issues 19/07/2023 at 06:03 By Help Net Security Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than 1,000 executives from large global organizations surveyed, 89% on average who self-identified as leading suppliers said customers trust their

React to this headline:

Loading spinner

Supply chain executives unaware of growing customer trust issues Read More »

HashiCorp Buys BluBracket for Secrets Scanning Tech

HashiCorp Buys BluBracket for Secrets Scanning Tech 27/06/2023 at 23:24 By Ryan Naraine HashiCorp acquires BluBracket secrets-scanning technology to help businesses block accidental leaks and fight secret sprawl. The post HashiCorp Buys BluBracket for Secrets Scanning Tech appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

HashiCorp Buys BluBracket for Secrets Scanning Tech Read More »

How to create SBOMs for container images

How to create SBOMs for container images 21/06/2023 at 09:06 By Help Net Security The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative efforts

React to this headline:

Loading spinner

How to create SBOMs for container images Read More »

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals 25/05/2023 at 08:12 By Help Net Security The widespread adoption of remote and hybrid working practices in recent years has brought numerous benefits to various industries, but has also introduced new cyber threats, particularly in the critical infrastructure sector. These threats

React to this headline:

Loading spinner

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals Read More »

Scroll to Top