IoT Security
Boston, MA-based start-up firm DUST Identity has emerged from stealth with $2.3 million seed funding led by Kleiner Perkins, with participation from New Science...
Hi, what are you looking for?
A threat actor published backdoored versions of 17 NPM packages from GlueStack in a fresh supply chain attack.
Boston, MA-based start-up firm DUST Identity has emerged from stealth with $2.3 million seed funding led by Kleiner Perkins, with participation from New Science...
Security researchers have uncovered a supply chain attack aimed at infecting organizations in South Korea with a remote access Trojan (RAT) to steal valuable...
Malvertising Campaign Steals Traffic From 10,000 Hacked WordPress Sites and Exploits the Online Advertising Supply Chain
Microsoft has shared details of a new attack that attempted to spread crypto-mining malware to a large number of users by compromising the software...
Organizations increasingly have to deal with cyberattacks targeting the software supply chain and in many cases they are not adequately prepared to respond to...
Mocana TrustCenter Manages Security Across IoT and ICS Device Lifecycles
As I’ve written before, sophisticated adversaries are finding vulnerabilities wherever they can, and often that means looking to an organization’s supply chain for weaknesses...
Proton, a remote access tool (RAT) that emerged in early 2017, has once again compromised a legitimate software’s distribution channel to spread, ESET warns.
After more than 145 million customer records were compromised in the Equifax data breach, the company’s stock plummeted by more than 30 percent. That...
Partnership Integrates BitSight’s Security Ratings Capabilities With CyberGRX Third-Party Cyber Risk Exchange
After expanding operations to Americas earlier this year, the financially-motivated "Cobalt" cybercriminal group has changed techniques and is now using supply chain attacks to target...
The need to maintain security over the supply chain has been confirmed by alerts issued at the end of last week by both IBM...
The Association of British Travel Agents (ABTA) today informed users of a breach that may have affected up to 43,000 customers.
Many of the most high-profile breaches have been a result of weak links in an organization’s supply chain. The cyber attacks on Target, Home...
When it comes to cybersecurity, the common tact is to build out your network defenses and then extend to endpoints. But as business becomes...
A paper published aims to demonstrate that developing rootkits for devices running Cisco IOS doesn’t require advanced knowledge or the resources of a nation...
Manufacturing supply chains are vital to the development and fulfillment of any modern technology—they change rapidly as sectors overlap, products evolve, and global locations...
I have regular conversations with Derek Byrum, the chief data scientist at our company, where I ask him “what’s jumping out at you?” as...
The National Institute of Standards and Technology (NIST) has released an updated draft of guidelines for evaluating risk in the supply chain. The organization...
Microsoft on Tuesday released updated versions of white papers focused on software supply chain security and critical infrastructure protection.