supply chain

Integrating cybersecurity into vehicle design and manufacturing

Integrating cybersecurity into vehicle design and manufacturing 2024-02-12 at 08:01 By Mirko Zorz In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and connected vehicles. Edan highlights the challenges of technological advancements and outlines strategies for automakers to address cyber […]

React to this headline:

Loading spinner

Integrating cybersecurity into vehicle design and manufacturing Read More »

AnyDesk Revokes Passwords, Certificates in Response to Hack

AnyDesk Revokes Passwords, Certificates in Response to Hack 2024-02-05 at 13:01 By Eduard Kovacs AnyDesk is revoking certificates and passwords in response to a recently discovered security breach impacting production systems. The post AnyDesk Revokes Passwords, Certificates in Response to Hack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

AnyDesk Revokes Passwords, Certificates in Response to Hack Read More »

CISOs’ role in identifying tech components and managing supply chains

CISOs’ role in identifying tech components and managing supply chains 2024-01-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive visibility. Warfield also discusses the vital collaboration between security and

React to this headline:

Loading spinner

CISOs’ role in identifying tech components and managing supply chains Read More »

Why resilience leaders must prepare for polycrises

Why resilience leaders must prepare for polycrises 2024-01-24 at 07:02 By Help Net Security In this Help Net Security video, Frank Shultz, CEO of Infinite Blue, discusses how more frequent and severe disruptions and our increasingly interconnected world collide to create a new threat for resilience leaders to manage: polycrises. These multiple concurrent or cascading

React to this headline:

Loading spinner

Why resilience leaders must prepare for polycrises Read More »

The reality of hacking threats in connected car systems

The reality of hacking threats in connected car systems 2024-01-22 at 07:31 By Mirko Zorz With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and

React to this headline:

Loading spinner

The reality of hacking threats in connected car systems Read More »

Software Supply Chain Security Startup Kusari Raises $8 Million 

Software Supply Chain Security Startup Kusari Raises $8 Million  2024-01-18 at 17:03 By Ionut Arghire Kusari has raised $8 million to help organizations gain visibility into and secure their software supply chain. The post Software Supply Chain Security Startup Kusari Raises $8 Million  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Software Supply Chain Security Startup Kusari Raises $8 Million  Read More »

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise 2024-01-12 at 14:31 By Ionut Arghire Researchers detail a CI/CD attack leading to PyTorch releases compromise via GitHub Actions self-hosted runners. The post New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise Read More »

Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack 

Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack  2024-01-08 at 15:46 By Ionut Arghire Self-hosted GitHub Actions runners could allow attackers to inject malicious code into repositories, leading to supply chain attacks. The post Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD

React to this headline:

Loading spinner

Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack  Read More »

Supply chain emerges as major vector in escalating automotive cyberattacks

Supply chain emerges as major vector in escalating automotive cyberattacks 20/12/2023 at 08:05 By Help Net Security In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive suppliers, not

React to this headline:

Loading spinner

Supply chain emerges as major vector in escalating automotive cyberattacks Read More »

Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies

Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies 14/12/2023 at 14:35 By Ionut Arghire US, UK, and Poland warn of Russia-linked cyberespionage group’s broad exploitation of recent TeamCity vulnerability. The post Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies Read More »

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain 14/12/2023 at 07:02 By Help Net Security The number of cyber breaches targeting organizations’ supply chains continues to rise, with an average 4.16 breaches reported to be negatively impacting operations this year — a 26% increase from the mean number

React to this headline:

Loading spinner

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain Read More »

SCS 9001 2.0 reveals enhanced controls for global supply chains

SCS 9001 2.0 reveals enhanced controls for global supply chains 11/12/2023 at 08:31 By Mirko Zorz In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses SCS 9001 Release 2.0, a certifiable standard crafted to assist organizations in operationalizing the NIST and other government guidelines and frameworks. Enhancing its predecessor,

React to this headline:

Loading spinner

SCS 9001 2.0 reveals enhanced controls for global supply chains Read More »

Alert fatigue puts pressure on security and development teams

Alert fatigue puts pressure on security and development teams 08/12/2023 at 08:02 By Help Net Security Security practitioners are under a tremendous amount of pressure to secure today’s applications, according to Cycode. The research found that AppSec chaos reigns, with 78% of CISOs responding that today’s AppSec attack surfaces are unmanageable and 90% of responders

React to this headline:

Loading spinner

Alert fatigue puts pressure on security and development teams Read More »

UAE researchers launch blockchain carbon trading platform at COP28

UAE researchers launch blockchain carbon trading platform at COP28 07/12/2023 at 04:04 By Cointelegraph by Brayden Lindrea The institute said it adopted a lightweight and efficient blockchain not intended to be computationally wasteful, where trading can be facilitated at little to no cost. This article is an excerpt from Cointelegraph.com News View Original Source React

React to this headline:

Loading spinner

UAE researchers launch blockchain carbon trading platform at COP28 Read More »

North Korean Software Supply Chain Attack Hits North America, Asia 

North Korean Software Supply Chain Attack Hits North America, Asia  24/11/2023 at 15:46 By Eduard Kovacs North Korean hackers breached a Taiwanese company and used its systems to deliver malware to the US, Canada, Japan and Taiwan in a supply chain attack. The post North Korean Software Supply Chain Attack Hits North America, Asia  appeared

React to this headline:

Loading spinner

North Korean Software Supply Chain Attack Hits North America, Asia  Read More »

New horizons in cyber protection with 2024 trends to watch

New horizons in cyber protection with 2024 trends to watch 23/11/2023 at 08:02 By Help Net Security 2023 proved to be another challenging year for companies combating supply chain security and breaches. The 2024 outlook could be worse as attacks become increasingly sophisticated. In this Help Net Security video, Fei Huang, VP of Security Strategy

React to this headline:

Loading spinner

New horizons in cyber protection with 2024 trends to watch Read More »

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets 22/11/2023 at 20:31 By Ryan Naraine Researchers at Aqua call urgent attention to the public exposure of Kubernetes configuration secrets, warning that hundreds of organizations are vulnerable to this “ticking supply chain attack bomb.” The post Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets appeared first on

React to this headline:

Loading spinner

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets Read More »

CISOs vs. developers: A battle over security priorities

CISOs vs. developers: A battle over security priorities 13/11/2023 at 09:01 By Help Net Security A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, there is a clear disconnect and even some distrust between CISOs and developers

React to this headline:

Loading spinner

CISOs vs. developers: A battle over security priorities Read More »

US Government Issues Guidance on SBOM Consumption

US Government Issues Guidance on SBOM Consumption 10/11/2023 at 15:01 By Ionut Arghire CISA, NSA, and ODNI issue new guidance on managing open source software and SBOMs to maintain awareness on software security. The post US Government Issues Guidance on SBOM Consumption appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

US Government Issues Guidance on SBOM Consumption Read More »

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution 09/11/2023 at 15:48 By Ionut Arghire UK-based Risk Ledger has raised £6.25 million (~$7.65 million) in Series A funding to prevent supply chain attacks. The post Risk Ledger Raises £6.25 Million for Supply Chain Security Solution appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Risk Ledger Raises £6.25 Million for Supply Chain Security Solution Read More »

Scroll to Top