Seven Malicious Go Packages Found Deploying Malware on Linux and macOS SystemsOngoing campaign targets Go ecosystem with typosquatted modules deploying malware on Linux and macOS.
A Catastrophic Hospital Hack Ends in a Leak of 300M Patient RecordsSnowflake targeted in supply chain attack, Kaspersky software banned in the US, AI startup under scrutiny, Amazon's face-recognition tools utilized in UK train stations.
Supply chain attack strikes array of Chrome ExtensionsA recent supply chain attack has impacted Chrome extension developers, compromising user data on a large scale.
Nearly 400,000 WordPress credentials stolenA security breach by MUT-1244 has resulted in the theft of over 390,000 WordPress credentials, highlighting the vulnerability of security researchers and pentesters.
What we know about the Hezbollah pagers attackThe explosion of Hezbollah's pagers could indicate a complex supply chain attack, with implications for security and surveillance efforts.
Polyfill Becomes a Supply-Chain Risk to 100,000 Websites - DevOps.comA Chinese company acquired Polyfill domain & GitHub, leading to malicious code delivery affecting 100k websites.
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS SystemsOngoing campaign targets Go ecosystem with typosquatted modules deploying malware on Linux and macOS.
A Catastrophic Hospital Hack Ends in a Leak of 300M Patient RecordsSnowflake targeted in supply chain attack, Kaspersky software banned in the US, AI startup under scrutiny, Amazon's face-recognition tools utilized in UK train stations.
Supply chain attack strikes array of Chrome ExtensionsA recent supply chain attack has impacted Chrome extension developers, compromising user data on a large scale.
Nearly 400,000 WordPress credentials stolenA security breach by MUT-1244 has resulted in the theft of over 390,000 WordPress credentials, highlighting the vulnerability of security researchers and pentesters.
What we know about the Hezbollah pagers attackThe explosion of Hezbollah's pagers could indicate a complex supply chain attack, with implications for security and surveillance efforts.
Polyfill Becomes a Supply-Chain Risk to 100,000 Websites - DevOps.comA Chinese company acquired Polyfill domain & GitHub, leading to malicious code delivery affecting 100k websites.
Secure Node.js Applications from Supply Chain AttacksNode.js applications are particularly vulnerable to supply chain attacks; attention to security best practices is essential.
OpenWrt supply chain attack scare prompts urgent upgradesOpenWrt users should upgrade to the same image version to mitigate risks from a reported supply chain attack.
Secure Node.js Applications from Supply Chain AttacksNode.js applications are particularly vulnerable to supply chain attacks; attention to security best practices is essential.
OpenWrt supply chain attack scare prompts urgent upgradesOpenWrt users should upgrade to the same image version to mitigate risks from a reported supply chain attack.
The detonation of pagers used by Hezbollah shows the depths of supply-chain infiltrationThe coordinated attacks in Lebanon indicate a high level of sophistication and planning, likely by a state actor utilizing global supply chains.
GitLab releases security updates to fix 17 vulnerabilitiesGitLab's recent security update addresses 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9 posing severe risks.
Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to DevelopersA new supply chain attack technique called Revival Hijack targets the PyPI registry, allowing attackers to exploit existing packages for malicious intent.
Mystery criminals backdoor courtroom recording softwareCourtroom software backdoor discovered, necessitating re-imaging and credential resets for full mitigation.
Crooks plant backdoor in software used by courtrooms around the worldA software update for JAVS Viewer 8 contained a hidden backdoor, putting over 10,000 courtrooms at risk of unauthorized access by threat actors.
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux BackdoorXZ Utils is widely used in Unix-based systems like Linux for data compression.The XZ backdoor allowed remote code execution via SSH login certificates and affected versions 5.6.0 and 5.6.1.
Judge mostly tosses SEC claims against SolarWinds securityJudge dismisses SEC lawsuit against SolarWinds post-SUNBURST attack claims; sustains securities fraud allegations for pre-SUNBURST statements about Orion product security.
Millions of sites could've been exposed in the Polyfill, BootCDN, Bootcss, and Staticfile attack - and it was all orchestrated by a single operatorA supply chain attack using multiple CDNs affected countless websites, prompting warnings and actions to mitigate potential risks.
Over 100K+ Sites Hit by Polyfill.io Supply Chain AttackSansec unveiled a supply chain attack affecting Polyfill JS service through multiple CDNs, impacting over 100K sites.