Forem

# supplychainsecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers
Cover image for Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers

Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers

Comments
9 min read
AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

AI Hallucinated Dependencies Are the New Supply Chain Attack: How to Stop Them

Comments
8 min read
Supply Chain Security Proxy: Move Beyond Vulnerability Scanning

Supply Chain Security Proxy: Move Beyond Vulnerability Scanning

Comments
8 min read
GitHub Actions Security: How to Stop Secret Leaks in CI/CD

GitHub Actions Security: How to Stop Secret Leaks in CI/CD

Comments
7 min read
How Attackers Turned Trivy Into a Weapon Against Cisco

How Attackers Turned Trivy Into a Weapon Against Cisco

Comments
4 min read
Cisco's Source Code Breach Was Structural, Not Accidental

Cisco's Source Code Breach Was Structural, Not Accidental

Comments
3 min read
Governing Security in the Age of Infinite Signal – From Discovery to Control

Governing Security in the Age of Infinite Signal – From Discovery to Control

Comments
7 min read
Supply chain security for dependencies
Cover image for Supply chain security for dependencies

Supply chain security for dependencies

Comments
3 min read
JPMorgan Just Published a Cyber To-Do List and Snyk Covers 8 of the 10 Items. How do you stack up?
Cover image for JPMorgan Just Published a Cyber To-Do List and Snyk Covers 8 of the 10 Items. How do you stack up?

JPMorgan Just Published a Cyber To-Do List and Snyk Covers 8 of the 10 Items. How do you stack up?

Comments
6 min read
Supermicro GPU Smuggling: What the Indictment Reveals

Supermicro GPU Smuggling: What the Indictment Reveals

Comments
7 min read
The Vulnerability Scanner That Became the Vulnerability
Cover image for The Vulnerability Scanner That Became the Vulnerability

The Vulnerability Scanner That Became the Vulnerability

1
Comments 2
2 min read
How to Detect and Recover From a Compromised Container Scanner
Cover image for How to Detect and Recover From a Compromised Container Scanner

How to Detect and Recover From a Compromised Container Scanner

Comments
5 min read
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
Cover image for Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

1
Comments
9 min read
Should RubyGems/Bundler Have a Cooldown Feature?

Should RubyGems/Bundler Have a Cooldown Feature?

56
Comments 5
4 min read
18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

7
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.