Security News

Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
2024-06-26 04:24

Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired the domain and modified the JavaScript library ("polyfill.js") to...

B+ security rating masks healthcare supply chain risks
2024-06-26 03:00

While the healthcare sector gets a "B+" security rating for the first half of 2024, it faces a critical vulnerability: supply chain cyber risk, according to SecurityScorecard. The US healthcare industry's security ratings were better than expected, with an average score of 88.

Plugins on WordPress.org backdoored in supply chain attack
2024-06-25 19:25

A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP scripts that create new accounts with administrative privileges on websites running them. Although it is possible that the attack impacts a larger number of WordPress plugins, current evidence suggests that the compromise is limited to the aforementioned set of five.

Polyfill.io JavaScript supply chain attack impacts over 100K sites
2024-06-25 18:10

Over 100,000 sites have been impacted in a supply chain attack by the Polyfill.io service after a Chinese company acquired the domain and the script was modified to redirect users to malicious and scam sites. The polyfill.io service is used by hundreds of thousands of sites to allow all visitors to use the same codebase, even if their browsers do not support the same modern features as newer ones.

Supply Chain Attack against Courtroom Software
2024-05-30 11:04

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack. The software, known as the JAVS Viewer 8, is a component of the JAVS Suite 8, an application package courtrooms use to record, play back, and manage audio and video from proceedings.

Suspected supply chain attack backdoors courtroom recording software
2024-05-24 20:29

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

JAVS courtroom recording software backdoored in supply chain attack
2024-05-23 21:17

Attackers have backdoored the installer of widely used Justice AV Solutions courtroom video recording software with malware that lets them take over compromised systems. JAVS has since removed the compromised version from its official website, saying that the trojanized software containing a malicious fffmpeg.

It may take decade to shore up software supply chain security, says infosec CEO
2024-05-03 17:30

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Securing your organization’s supply chain: Reducing the risks of third parties
2024-05-02 05:10

This highlights how digitally connected organizations are dependent on each other, and when one link in the supply chain is broken it can have a cascading effect on others. As soon as an organization's data moves over to a third party, the risks around it increase.

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks
2024-04-29 10:50

A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results in...