Security News

Supply chain attack on popular GitHub Action exposes CI/CD secrets
2025-03-17 15:24

A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build...

GitHub supply chain attack spills secrets from 23,000 projects
2025-03-17 12:34

Large organizations among those cleaning up the mess It's not such a happy Monday for defenders wiping the sleep from their eyes only to deal with the latest supply chain attack.…

Silk Typhoon hackers now target IT supply chains to breach networks
2025-03-05 18:18

Microsoft warns that Chinese cyber-espionage threat group 'Silk Typhoon' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them...

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
2025-03-05 15:44

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT)...

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers
2025-02-27 07:15

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company's CEO Ben Zhou declared a "war against...

North Korea targets crypto developers via NPM supply chain attack
2025-02-13 12:00

Yet another cash grab from Kim's cronies and an intel update from Microsoft North Korea has changed tack: its latest campaign targets the NPM registry and owners of Exodus and Atomic...

It’s time to secure the extended digital supply chain
2025-02-12 05:30

Organizations’ increasing reliance on third-party software and services has created an environment with more vulnerabilities and harder-to-detect risks. Attackers know they can increase efficiency...

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment
2025-02-11 10:07

Imagine you're considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, and reliability. You might even take it for a test drive to ensure...

Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
2025-02-04 11:00

When cloud customers don't clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds...

Supply chain attack hits Chrome extensions, could expose millions
2025-01-22 19:45

Threat actor exploited phishing and OAuth abuse to inject malicious code Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that...