News

Supply chain cyberattacks are on the rise, and the increasingly connected global economy is making it easier than ever for malicious actors to carry out these attacks, which exploit the trust ...
Hundreds of e-commerce sites, at least one owned by a large multinational company, were backdoored by malware that executes ...
Although, third parties also leave organizations vulnerable to supply chain attacks. Many attacks originate from compromised software or hardware. By adding malicious code to a target vendor’s ...
According to Mandiant, a 3CX employee’s PC was hacked through an earlier software-supply-chain attack that hijacked an application of the financial software firm Trading Technologies ...
Supply chain attacks exploit vulnerabilities within an organization's network of suppliers and partners, creating a significant risk even for enterprises with strong defenses. Let’s discuss how ...
SolarWinds and Log4j have made software supply chain ... category of attacks should cause those who blindly trust open source software to reconsider their attitude. There’s a meme that your ...
The incident responders investigating how hackers carried out a complex supply-chain attack targeting enterprise phone provider 3CX say the company was compromised by another supply chain attack.
The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone ...
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack that distributed a trojanized installer to drop the Bumblebee malware ...
The supply chain compromise of a widely used VoIP phone system vendor, 3CX, has led to attacks against numerous customers and prompted comparisons to some of the largest breaches in recent memory ...
Behind each headline of a supply chain attack are organizations and victims facing the consequences of a brutal infiltration. Equipped with automated tools, hackers can hunt through cloud-native ...