supply chain security

Securing the Software Supply Chain: Checkmarx One Expands its Offerings
The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to ...
Security Boulevard
The Supply Chain Conspiracy: Cyber Attacks Behind the Lebanon Explosions
On September 17 and 18, a series of devastating explosions rocked Lebanon, resulting in 37 fatalities and nearly 3,000 injuries, according to the Lebanese Minister of Public Health. Initial investigations suggest these ...
Dependency Confusion Attacks and Prevention: Register Your Private Package Names
Dependency confusion attacks exploit gaps in your software supply chain. Dive into modern dependency management and learn how to defend your systems with best practices ...

Networking Equipment Riddled With Software Supply Chain Risks
Nathan Eddy | | CVE, IT network, IT Security, networking, router, SBOM, supply chain security, switch, vulnerability
Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors ...
Security Boulevard
Researchers Uncover UEFI Vulnerability Affecting Intel CPUs
Wajahat Raja | | Code execution within UEFI firmware, Cybersecurity News, Malicious code execution, Phoenix SecureCore UEFI firmware, supply chain security, Trusted Platform Module (TPM) configuration
Cybersecurity researchers have recently uncovered a UEFI vulnerability in the Phoenix SecureCore UEFI firmware, which affects a variety of Intel Core desktop and mobile processors. This now-patched vulnerability, identified as CVE-2024-0762 with ...

More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices ...

Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric)
This blog is based on our conversation with Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric. It covers the unique challenges of software supply chain security ...
Threat Hunting 101: Five Common Threats to Look For
Learn more about supply chain threats and where to find them ...

Vulnerability of the Month – Controversy of the JetBrains TeamCity CVE-2024-27198 & CVE-2024-27199
This month we dive into CVE-2024-27198 for JetBrains TeamCity and the controversy surrounding the patching process that contributed to it being exploited in the wild ...

Why you need an SBOM (Software Bill Of Materials)
SBOMs are security analysis artifacts becoming required by more companies due to internal policies and government regulation. If you sell or buy software, you should know the what, why, and how of ...