News

The supply chain compromise of a ... Reports from researchers at numerous security vendors since Wednesday have pointed to an active campaign using a compromised version of the 3CX app to target ...
In a blog post, software supply chain security firm Endor Labs wrote: “The attacker was likely not looking for secrets in public repositories – they are already public. They were likely looking to ...
A desktop communications app from 3CX has been infected by malicious code in a software supply chain attack, and the compromised app is now actively being used by a threat actor to target 3CX ...
The Cybersecurity and Infrastructure Security Agency (CISA) has officially acknowledged the issue, noting that “This supply chain compromise allows for information disclosure of secrets ...
The GitHub Action supply chain compromise that threatened the security of more than 23,000 repositories appears to be linked to a previously undisclosed attack against a second entity last week ...
On Friday, security researchers spotted that the source code ... They were likely looking to compromise the software supply chain for other open source libraries, binaries, and artifacts created with ...
Compromise of the supply chain may provide a means to circumvent computer security measures that are in place to protect these critical systems, therefore a defence-in-depth approach that involves ...
The compromise of GitHub Action ... 218 repositories exposed secrets due to the supply chain attack. Despite the small number, the potential security repercussions are still significant as some ...
A new report out today from software supply chain company JFrog Ltd. warns that an expansion of artificial intelligence ...
A cascading supply chain attack that began with the compromise of the "reviewdog/action ... grep reviewdog/action-typos Wiz explains that the security breach at Reviewdog was remediated ...