Tag: supply chains
-
Schneier on Security: Delivering Malware Through Abandoned Amazon S3 Buckets
Source URL: https://www.schneier.com/blog/archives/2025/02/delivering-malware-through-abandoned-amazon-s3-buckets.html Source: Schneier on Security Title: Delivering Malware Through Abandoned Amazon S3 Buckets Feedly Summary: Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize…
-
The Register: AUKUS blasts holes in LockBit’s bulletproof hosting provider
Source URL: https://www.theregister.com/2025/02/11/aukus_zservers_lockbit_sanctions/ Source: The Register Title: AUKUS blasts holes in LockBit’s bulletproof hosting provider Feedly Summary: UK foreign secretary says Putin is running a ‘corrupt mafia state’ One of the bulletproof hosting (BPH) providers used by the LockBit ransomware operation has been hit with sanctions in the US, UK, and Australia (AUKUS), along with…
-
Anchore: DORA + SBOM Primer: Achieving Software Supply Chain Security in Regulated Industries
Source URL: https://anchore.com/blog/dora-overview/ Source: Anchore Title: DORA + SBOM Primer: Achieving Software Supply Chain Security in Regulated Industries Feedly Summary: At Anchore, we frequently discuss the steady drum beat of regulatory bodies mandating SBOMs (Software Bills of Materials) as the central element of modern software supply chain security. The Digital Operational Resilience Act (DORA) is…
-
Anchore: Increase Supply Chain Transparency & Security with Harbor and Anchore
Source URL: https://anchore.com/webinars/increase-supply-chain-transparency-security-with-harbor-and-anchore/ Source: Anchore Title: Increase Supply Chain Transparency & Security with Harbor and Anchore Feedly Summary: The post Increase Supply Chain Transparency & Security with Harbor and Anchore appeared first on Anchore. AI Summary and Description: Yes Summary: The text discusses a live webinar focused on enhancing supply chain security and compliance for…
-
Anchore: SBOM Management: How to Tackle Sprawl and Secure Your Supply Chain
Source URL: https://anchore.com/blog/sbom-management-how-to-tackle-sprawl-and-secure-your-supply-chain/ Source: Anchore Title: SBOM Management: How to Tackle Sprawl and Secure Your Supply Chain Feedly Summary: Software Bill of Materials (SBOM) has emerged as a pivotal technology to scale product innovation while taming the inevitable growth of complexity of modern software development. SBOMs are typically thought of as a comprehensive inventory of…
-
The Register: Lazarus Group cloned open source projects to plant backdoors, steal credentials
Source URL: https://www.theregister.com/2025/01/29/lazarus_groups_supply_chain_attack/ Source: The Register Title: Lazarus Group cloned open source projects to plant backdoors, steal credentials Feedly Summary: Stealing crypto is so 2024. Supply-chain attacks leading to data exfil pays off better? North Korea’s Lazarus Group compromised hundreds of victims across the globe in a massive secret-stealing supply chain attack that was ongoing…
-
The Register: ASML makes hay while suns shines, but Trump could rain on its parade
Source URL: https://www.theregister.com/2025/01/29/asml_q4_2024/ Source: The Register Title: ASML makes hay while suns shines, but Trump could rain on its parade Feedly Summary: Netherlands biz riding AI boom, though China crackdown looms Dutch tech giant ASML is buoyed up by a wave of new orders during Q4 2024, and expects its business in China to return…
-
Anchore: 2025 Cybersecurity Executive Order Requires Up Leveled Software Supply Chain Security
Source URL: https://anchore.com/blog/2025-cybersecurity-executive-order/ Source: Anchore Title: 2025 Cybersecurity Executive Order Requires Up Leveled Software Supply Chain Security Feedly Summary: A few weeks ago, the Biden administration published a new Executive Order (EO) titled “Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity”. This is a follow-up to the original cybersecurity executive order—EO 14028—from…