News

The Lumma infostealer has become a popular way for hackers to steal sensitive data like banking information and ...
The messages seemed innocuous, mundane even. Someone posing as a prospective guest emailed a hotel questions about a ...
Apparently, Coward wanted to review one of Procolored’s printers and, after trying to install the accompanying software from ...
Third-party supply chain attacks are the second most-cited cybersecurity risk for chief information security officers out of 350 different risks, second only to ransomware attacks.
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack where ... to drop the Bumblebee malware loader on users' machines.
It's no secret that software is a part of our daily lives. We use it to keep our schedules, connect with friends and family, ...
The software flagged the drive as containing ... Procolored attributed the malware to a supply chain compromise, stating that the malicious files were introduced through infected USB devices ...
Earth Ammit breached drone supply chains in VENOM and TIDRONE campaigns (2023–2024), compromising military targets via ERP ...
Chainguard Libraries for Python isn't just another repository; it’s an index of Python dependencies engineered to be resistant to malware.
The package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761 times.
Supply chain attack compromises the popular rand-user-agent scraping NPM package to deploy and activate a backdoor.
“Docker’s Hardened Images are a major step forward in software supply chain assurance,” said Steven Dickens, CEO and Principal Analyst at HyperFRAME Research. “In a market still in its ...