supply chain attack
Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning
A backdoor found in millions of Chinese-made RFID cards that are used by hotels and other businesses around the world can let bad actors instantly clone the cards to gain unauthorized access ...
Security Boulevard
The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks
Tom Eston | | anti-virus, antivirus, backdoor, ban, Banned, Biden, Biden administration, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, kaspersky, Kaspersky Antivirus, Malware, Podcast, Podcasts, Privacy, Russia, security, supply chain, supply chain attack, technology, US, Weekly Edition, wordpress, WordPress Plugins
In episode 336 of the Shared Security Podcast, we discuss the Biden administration’s recent ban on Kaspersky antivirus software in the U.S. due to security concerns linked to its Russian origins. We ...
Python Developers Targeted Via Fake Crytic-Compilers Package
Wajahat Raja | | Crytic-compilers, Cyber Attack Prevention, Cyber Threats, Cybersecurity, Cybersecurity News, Data theft prevention, Dependency Management, Developer vigilance, information stealer, Lumma malware, malware-as-a-service, Package authenticity, PyPI security, Python developers, Python package security, Python security best practices, secure coding practices, Software Development, supply chain attack, Threat Intelligence, Typosquatting
As per recent reports, cybersecurity experts uncovered a troubling development on the Python Package Index (PyPI) – a platform used widely by developers to find and distribute Python packages. A malicious package ...
CERT-UA Reports SickSync Campaign: Data Theft Crucial Alert
Wajahat Raja | | CERT-UA, cyber attack response, Cyber Espionage, cyber threat actors, cybersecurity awareness, Cybersecurity News, cybersecurity threats, data exfiltration, data theft, information stealer, Luhansk People's Republic, Malware Detection, SickSync campaign, spear-phishing, SPECTR malware, state-sponsored-hacking, supply chain attack, SyncThing, UAC-0020, Ukraine cybersecurity, Vermin
Recently, the Computer Emergency Response Team of Ukraine cybersecurity (CERT-UA) issued a warning regarding a targeted cyber espionage campaign named SickSync, orchestrated by a group identified as UAC-0020 or Vermin. The CERT-UA ...
Courtroom Recording Software Compromised in Supply Chain Attack
Threat actors compromised a popular audio-visual software package used in courtrooms, prisons, government, and lecture rooms around the world by injecting a loader malware that gives the hackers remote access to infected ...
Security Boulevard
Ledger Supply Chain Breach: $600,000 Theft Unveiled
Wajahat Raja | | countermeasures, crypto drainer malware, cryptocurrency theft, cybercrime, Cybersecurity News, hardware wallet, ledger, Ledger Connect Kit, Legal Action, NPM account, phishing attack, Proactive Cybersecurity, rogue project, safeguarding cryptocurrency assets, security measures, software wallet, supply chain attack, supply chain breach, technical details, threat actors, unauthorized transactions, virtual assets, WalletConnect
Recent events have brought to light the Ledger supply chain breach, a cybercrime incident that led to the theft of $600,000 in virtual assets. For those who don’t know, Ledger is a ...
Navigating Open-Source Supply Chain Threats: Protecting Your Software Ecosystem
Artem Karasev | | Malware & Exploits, Open Source Threats, supply chain attack, Supply Chain Cybersecurity Attacks, Supply Chain threats
In today’s business world, companies are determined to create software faster than ever before. Developers are under immense pressure to deliver products to customers quickly. To accelerate this process, developers often rely ...
GitHub Repositories Victimized Amid Supply Chain Attack
Wajahat Raja | | Cyber Threats, Cybersecurity, Cybersecurity News, Dependabot, GitHub, GitHub repositories, Malware, supply chain attack
In a digital landscape rife with vulnerabilities, a recent and disconcerting phenomenon has come to light. GitHub repositories, the foundation of numerous software projects, have been victimized by a devious supply chain ...
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
Tom Eston | | Brushing, china, Complex Passwords, Cyber Security, cyberattack, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, military, MOVEit, Password, Password Rotations, passwords, Podcast, Podcasts, Privacy, security, Security Awareness, smartwatch, Smartwatches, supply chain, supply chain attack, technology, US Army, vulnerability, Weekly Edition
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, ...
Lazarus Assault Via 3CX Exposes Need to Rethink Security
When North Korean threat actors the Lazarus Group exploited a legitimate update to the 3CXDesktopApp—a softphone application from 3CX—security professionals didn’t initially pick up on the import of the activity and tactics ...
Security Boulevard