Please turn on your JavaScript for this page to function normally.

supply chain compromise

npm
How threat actors are using npm to launch attacks

WhiteSource released a threat report based on malicious activity found in npm, the most popular JavaScript package manager used by developers worldwide. The report is based on …

Shark
Top attack trends every organization should build resilience against

Expel announced the release of the cybersecurity trends and predictions for 2022. Based on aggregated data from its security operations center (SOC), the report provides …

risk
Cyber risks top worldwide business concerns in 2022

Cyber perils are the biggest concern for companies globally in 2022, according to the Allianz Risk Barometer. The threat of ransomware attacks, data breaches or major IT …

skull
Software supply chain attacks jumped over 300% in 2021

Software supply chain attacks grew by more than 300% in 2021 compared to 2020, according to a study by Argon Security. According to the study, researchers discovered attackers …

arrows
Supply chain disruptions rose in 2021

56% of businesses experienced more supply chain disruptions in 2021 than 2020, a Hubs report reveals. Last year was marked by a number of challenges, including computer chip …

person
Supply chain cybersecurity: Pain or pleasure?

Whatever sector your business operates in, you will depend on third parties to provide you with goods and services to support what you do. Whether you are a small printing …

Broken glass
Why is trust in legacy vendors on shaky ground?

A Vanson Bourne survey report highlights ransomware payout demands and extortion fees are massively increasing, while trust in legacy IT vendors has dipped and organizations …

lock
The ripple effect: Why protection against supply chain attacks is a must

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …

python pi
Malicious Python packages employ advanced detection evasion techniques

JFrog researchers have discovered 11 malicious Python packages on PyPI, the official third-party package repository for Python, which have been collectively downloaded over …

ecommerce
Retail industry security incidents soaring, worsened by the supply chain crisis

Imperva’s 12-month analysis on cybersecurity risks in the retail industry suggests that the 2021 holiday shopping season will be further disrupted by cybercriminals …

analyst
A ransomware reality check for CISOs

The rising tide of ransomware attacks targeting critical infrastructure sectors has reached unprecedented heights. Now at the top of many CISOs’ agendas, a confluence of …

Hand
Trojan Source bugs may lead to extensive supply-chain attacks on source code

Cambridge University researchers have detailed a new way targeted vulnerabilities can be introduced into source code while making them invisible to human code reviewers, …

Don't miss

Cybersecurity news