#supplychainattacks

Ars Technica Newsarstechnica@c.im
2025-12-31

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025 arstechni.ca/g8eH #supplychainattacks #signalmessenger #2025yearend #Security #Biz&IT #Apple #cloud #AI

Fiona :transbian: :autism:Fiona@blahaj.zone
2025-11-28

So Senna just told me about the most recent attack on #NPM.

I swear I wrote the above post independent of that! The problem ist just so pervasive that you keep running into it.

#supplychainattacks

Pluralistic: Daily links from Cory Doctorow – No trackers, no ads. Black type, white background. Privacy policy: we don't collect or retain any data at all ever period.pluralistic.net@web.brid.gy
2025-11-26
2025-09-12

Supply chain attacks reached unprecedented scale this week, affecting billions of users through compromised development tools and package repositories.

#cybersecurity #supplychainattacks #artificialintelligence #malware #hacking

cybernewsweekly.substack.com/p

Ars Technica Newsarstechnica@c.im
2025-09-09

Software packages with more than 2 billion weekly downloads hit in supply-chain attack arstechni.ca/PHyN #supplychainattacks #supplychain #opensource #Security #Biz&IT #npm

2025-09-02

A single weak link can bring down giants. Recent supply-chain attacks exploited trusted vendor vulnerabilities to compromise big names like Palo Alto, Google, and more. How deep does the security gap really run?

thedefendopsdiaries.com/unders

#supplychainattacks
#cybersecurity
#infosec
#databreach
#thirdpartysecurity

Negative PID Inc.negativepid
2025-08-27

Supply-chain attacks are a favourite in the toolbox of cyber warfare. The SolarWinds attack remains in the history books of cybersecurity for the clever use of patching as an attack vector to disrupt C2 infrastructure.

Read how it unfolded in our deep dive article! πŸ‘‡

negativepid.blog/the-solarwind

Ars Technica Newsarstechnica@c.im
2025-07-25

Supply-chain attacks on open source software are getting out of hand arstechni.ca/t2ay #supplychainattacks #repositories #opensource #Security #Biz&IT

xoron :verified:xoron@infosec.exchange
2025-06-28

Are Web Components & Cybersecurity A Better Combo?

I'm not trying to dunk on popular #UI #frameworks – I'm sure they're totally fine for #cybersecurity stuff, probably get loads of reviews and #audits.

But from my angle: Web Components are *native* to the #browser. Doesn't that just inherently reduce the risk of **#SupplyChainAttacks** (you know, like a rogue `npm install` on a bad network) for your #AppSecurity?

Or am I overthinking it, and the #framework choice is less important than the #browser, #OS, or #device running it? What are your thoughts, #DevCommunity?

---

Quick context: I've got a #ReactJS #messagingApp (repo here: github.com/positive-intentions) and a separate #UIFramework (repo here: github.com/positive-intentions) built with #Lit (which uses Web Components). I'm genuinely wondering if there's a compelling #cybersecurity reason to refactor the chat app to use my #WebComponent UI framework. Might be a whole new level of #SecurityByDesign for #FrontEndDev.

FYI, same question's on Reddit here: reddit.com/r/ExperiencedDevs/c, got some good #insights, but want to make sure nothing's getting overlooked! Let's discuss #InfoSec #WebDev #JavaScript #OpenSource #TechQuestion.

Negative PID Inc.negativepid
2025-06-25

Supply-chain attacks are a favourite in the toolbox of cyber warfare. The SolarWinds attack remains in the history books of cybersecurity for the clever use of patching as an attack vector to disrupt C2 infrastructure.

Read how it unfolded in our deep dive article! πŸ‘‡

negativepid.blog/the-solarwind

Hacker Newsh4ckernews
2025-03-23
2025-03-08

Undocumented backdoor found in Bluetooth chip used by a billion devices

> The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.

bleepingcomputer.com/news/secu

#infosec #supplychainsecurity #supplychainattacks

2024-12-30

The Register: It’s only a matter of time before LLMs jump start supply-chain attacks. ” Now that criminals have realized there’s no need to train their own LLMs for any nefarious purposes – it’s much cheaper and easier to steal credentials and then jailbreak existing ones – the threat of a large-scale supply chain attack using generative AI becomes more real.”

https://rbfirehose.com/2024/12/30/the-register-its-only-a-matter-of-time-before-llms-jump-start-supply-chain-attacks/

chris@strafpla.netchris@strafpla.net
2024-09-18

Putting on my headphones while thinking about future #supplyChainAttacks...

Kevin Karhan :verified:kkarhan@infosec.space
2024-07-19

@eroc1990 @JohnDal I disagree, as all such #SupplyChainAttacks are merely based upon lack or #reviewers and lack of #funding.

Not to mention it's easier and faster to fix #FOSS as well as the #diversity of systems mitigate said issues (i.e. #dropbear was affected by neither #RegreSSHion #XZ's #backdoor, likely preventing another #Mirai-Style #Botnet from being created...

After all, these issues are systemic, and denying the root cause is turning a blind eye at the obvious fix!

2024-07-12

Aanvallen op de softwareketen nemen een hoge vlucht - en beveiligingsleiders reageren traag
Meer slachtoffers van cyberaanvallen via software-supplychains:
agconnect.nl/tech-en-toekomst/
#cybersecurity #hackaanvallen #supplychainattacks #AGConnect #SijthoffMedia

LBHustonlbhuston
2024-07-11

They also list the estimated technical complexity, political complexity and financial cost of implementing each control rated as high, medium or low.

Read more πŸ‘‰ lttr.ai/AUqFx

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst