supply chain security - Tagged - Security Boulevard The Home of the Security Bloggers Network Wed, 20 Nov 2024 18:56:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png supply chain security - Tagged - Security Boulevard 32 32 133346385 Securing the Software Supply Chain: Checkmarx One Expands its Offerings https://securityboulevard.com/2024/11/securing-the-software-supply-chain-checkmarx-one-expands-its-offerings/ Wed, 20 Nov 2024 18:56:52 +0000 https://securityboulevard.com/?p=2037071 supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to robust strategies to safeguard their supply chains, including tools like SCA scanning, AI and container security, secrets detection and repository health monitoring. Checkmarx’s..

The post Securing the Software Supply Chain: Checkmarx One Expands its Offerings appeared first on Security Boulevard.

]]>
2037071
The Supply Chain Conspiracy: Cyber Attacks Behind the Lebanon Explosions https://securityboulevard.com/2024/09/the-supply-chain-conspiracy-cyber-attacks-behind-the-lebanon-explosions/ Fri, 20 Sep 2024 05:47:57 +0000 https://nsfocusglobal.com/?p=30485 On September 17 and 18, a series of devastating explosions rocked Lebanon, resulting in 37 fatalities and nearly 3,000 injuries, according to the Lebanese Minister of Public Health. Initial investigations suggest these attacks were not mere accidents but rather the result of a sophisticated cyber operation targeting communication devices. Understanding the Attack Experts indicate that […]

The post The Supply Chain Conspiracy: Cyber Attacks Behind the Lebanon Explosions appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post The Supply Chain Conspiracy: Cyber Attacks Behind the Lebanon Explosions appeared first on Security Boulevard.

]]>
2031111
Dependency Confusion Attacks and Prevention: Register Your Private Package Names https://securityboulevard.com/2024/08/dependency-confusion-attacks-and-prevention-register-your-private-package-names/ Thu, 15 Aug 2024 13:21:17 +0000 http://securityboulevard.com/?guid=8aed32361bc840492720e432a610b795 Dependency confusion attacks exploit gaps in your software supply chain. Dive into modern dependency management and learn how to defend your systems with best practices.

The post Dependency Confusion Attacks and Prevention: Register Your Private Package Names appeared first on Security Boulevard.

]]>
2027941
Networking Equipment Riddled With Software Supply Chain Risks https://securityboulevard.com/2024/07/networking-equipment-riddled-with-software-supply-chain-risks/ Fri, 26 Jul 2024 08:24:18 +0000 https://securityboulevard.com/?p=2025609 Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors.

The post Networking Equipment Riddled With Software Supply Chain Risks appeared first on Security Boulevard.

]]>
2025609
Researchers Uncover UEFI Vulnerability Affecting Intel CPUs https://securityboulevard.com/2024/07/researchers-uncover-uefi-vulnerability-affecting-intel-cpus/ Wed, 03 Jul 2024 07:00:26 +0000 https://tuxcare.com/?p=18206 Cybersecurity researchers have recently uncovered a UEFI vulnerability in the Phoenix SecureCore UEFI firmware, which affects a variety of Intel Core desktop and mobile processors. This now-patched vulnerability, identified as CVE-2024-0762 with a CVSS score of 7.5, has been termed “UEFIcanhazbufferoverflow.” It involves a buffer overflow caused by an unsafe variable in the Trusted Platform […]

The post Researchers Uncover UEFI Vulnerability Affecting Intel CPUs appeared first on TuxCare.

The post Researchers Uncover UEFI Vulnerability Affecting Intel CPUs appeared first on Security Boulevard.

]]>
2023289
More than 100K sites impacted by Polyfill supply chain attack https://securityboulevard.com/2024/07/more-than-100k-sites-impacted-by-polyfill-supply-chain-attack-2/ Mon, 01 Jul 2024 17:30:43 +0000 https://mend.io/more-than-100k-sites-impacted-by-polyfill-supply-chain-attack/ The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

The post More than 100K sites impacted by Polyfill supply chain attack appeared first on Security Boulevard.

]]>
2025760
Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric) https://securityboulevard.com/2024/06/software-supply-chain-risks-%e2%8e%aacassie-crossley-vp-supply-chain-security-schneider-electric/ Tue, 11 Jun 2024 08:32:14 +0000 http://securityboulevard.com/?guid=b82f36763b5b174383a4f01be4fa1398 This blog is based on our conversation with Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric. It covers the unique challenges of software supply chain security.

The post Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric) appeared first on Security Boulevard.

]]>
2021188
Threat Hunting 101: Five Common Threats to Look For https://securityboulevard.com/2024/05/threat-hunting-101-five-common-threats-to-look-for-2/ Thu, 30 May 2024 06:30:00 +0000 https://mend.io/threat-hunting-101-five-common-threats-to-look-for/ Learn more about supply chain threats and where to find them.

The post Threat Hunting 101: Five Common Threats to Look For appeared first on Security Boulevard.

]]>
2025770
Vulnerability of the Month – Controversy of the JetBrains TeamCity CVE-2024-27198 & CVE-2024-27199 https://securityboulevard.com/2024/05/vulnerability-of-the-month-controversy-of-the-jetbrains-teamcity-cve-2024-27198-cve-2024-27199/ Fri, 03 May 2024 18:42:28 +0000 http://securityboulevard.com/?guid=95253a570aa6cdfb540006b66431d674 This month we dive into CVE-2024-27198 for JetBrains TeamCity and the controversy surrounding the patching process that contributed to it being exploited in the wild.

The post Vulnerability of the Month – Controversy of the JetBrains TeamCity CVE-2024-27198 & CVE-2024-27199 appeared first on Security Boulevard.

]]>
2016979
Why you need an SBOM (Software Bill Of Materials) https://securityboulevard.com/2024/04/why-you-need-an-sbom-software-bill-of-materials/ Fri, 12 Apr 2024 17:49:14 +0000 http://securityboulevard.com/?guid=809f2e16116aef8ba0aad8140c9a6dc7 SBOMs are security analysis artifacts becoming required by more companies due to internal policies and government regulation. If you sell or buy software, you should know the what, why, and how of the SBOM.

The post Why you need an SBOM (Software Bill Of Materials) appeared first on Security Boulevard.

]]>
2014833