supply chain compromise
![Army](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/29122959/police-g804db4409_1920-400x200.jpg)
Federal defense contractors are not properly securing military secrets
Defense contractors hold information that’s vital to national security and will soon be required to meet Cybersecurity Maturity Model Certification (CMMC) compliance to …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/20131001/lock-storm-security-400x200.jpg)
How to assess and mitigate complex supply chain risks
As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …
![Fishpig Magento](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/14145142/fishpig-magento-400x200.jpg)
Attackers mount Magento supply chain attack by compromising FishPig extensions
FishPig, a UK-based company developing extensions for the popular Magento open-source e-commerce platform, has announced that its paid software offerings have been injected …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Supply chain risk is a top security priority as confidence in partners wanes
As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/25104637/pypl-400x200.jpg)
Phishing PyPI users: Attackers compromise legitimate projects to push malware
PyPI, the official third-party software repository for Python packages, is warning about a phishing campaign targeting its users. “We have additionally determined that …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
How to minimize your exposure to supply chain attacks
Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/09173929/network-blue-400x200.jpg)
Now is the time to focus on software supply chain security improvements
The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Threat actors increasingly use third parties to run their scams
Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them
There have been more than 200 dedicated supply chain attacks over the past decade. Some of these campaigns have affected countless supplier networks and millions of customers …
![Head](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195332/head-400x200.jpg)
How confident are IT pros in the security of their organization’s supply chain?
Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
Barely one-third of IT pros can vet code for tampering
Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD