supply chain compromise
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111018/magnify-hardware-400x200.jpg)
Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible …
![dashboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095803/dashboard-criminal-400x200.jpg)
Attackers breached Statcounter to steal cryptocurrency from gate.io users
Web analytics company Statcounter and cryptocurrency exchange gate.io have been compromised in another supply-chain attack, which resulted in an unknown number of gate.io …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110650/danger-400x200.jpg)
VestaCP users warned about possible server compromise
Unknown attackers have compromised the official distribution of the VestaCP hosting control panel solution to harvest server IPs and admin credentials. That information was …
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110652/traffic-400x200.jpg)
Knowing how to define, screen and monitor your third parties is essential to minimizing risk
A new NAVEX Global survey found that more than a third of organizations still use paper-based records or disparate office productivity software to administer their third-party …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Securing the supply chain: Organizations need best practices in proactive security
CrowdStrike announced the results of its global supply chain survey, Securing the Supply Chain, produced by research firm Vanson Bourne. The study surveyed 1,300 senior IT …
![Alert](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101242/alert-pills-400x200.jpg)
Orangeworm hackers target healthcare corporations
A hacking group dubbed Orangeworm has been targeting, either directly or indirectly, international corporations operating within the healthcare sector, Symantec researchers …
![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104913/trojan_horse-400x200.jpg)
MacOS Proton backdoor delivered via Trojanized media player app
A Trojanized version of Elmedia Player software for Mac was available for download for who knows how long from the developer’s official site, ESET researchers have …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco
There is a new twist in the CCleaner hack saga: the attackers apparently didn’t set out to compromise as many machines as possible, but were after some very specific …
![CCleaner](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103125/ccleaner-400x200.jpg)
Hackers backdoored CCleaner, likely affecting millions of users
Legitimately signed but backdoored versions of the popular CCleaner utility were available for download from the developer’s Web site and servers for nearly a month, …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105304/android-malware-400x200.jpg)
Android devices delivered to employees with pre-installed malware
A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees. These were smartphones by …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege