News

Hundreds of e-commerce sites, at least one owned by a large multinational company, were backdoored by malware that executes ...
The Lumma infostealer has become a popular way for hackers to steal sensitive data like banking information and ...
AI-generated computer code is rife with references to non-existent third-party libraries, creating a golden opportunity for ...
Third-party supply chain attacks are the second most-cited cybersecurity risk for chief information security officers out of 350 different risks, second only to ransomware attacks.
Apparently, Coward wanted to review one of Procolored’s printers and, after trying to install the accompanying software from ...
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack where ... to drop the Bumblebee malware loader on users' machines.
Earth Ammit breached drone supply chains in VENOM and TIDRONE campaigns (2023–2024), compromising military targets via ERP ...
Chainguard Libraries for Python isn't just another repository; it’s an index of Python dependencies engineered to be resistant to malware.
The software flagged the drive as containing ... Procolored attributed the malware to a supply chain compromise, stating that the malicious files were introduced through infected USB devices ...
That trust was misplaced: Citizen Lab alleges the version of UyghurEditPP linked to in the phishing mails was altered to include malware and “contained a backdoor that would allow the operator to ...
“Docker’s Hardened Images are a major step forward in software supply chain assurance,” said Steven Dickens, CEO and Principal Analyst at HyperFRAME Research. “In a market still in its ...
and build artifacts to identify malware, tampering, suspicious behaviors and more. To learn more about the new Gartner Market Guide for Software Supply Chain Security, join ReversingLabs on ...