Articles tagged with: #supply-chain Clear filter
Hackers Can Exploit (eval) or (exec) Python Calls to Execute Malicious Code

Hackers Can Exploit (eval) or (exec) Python Calls to Execute Malicious Code

Cyber Security News cybersecuritynews.com

A sophisticated obfuscation technique that threat actors are using to bypass detection systems and exploit Python's eval() and exec() functions for malicious code execution. With over 100 supply chain attacks reported on PyPI in the past five years, these techniques pose a significant risk to organizations relying on Python packages. Key Takeaways1. Hackers hide malicious

Implementing Zero Trust Architecture to Enhance Security and Resilience in the Pharmaceutical Supply Chain

Implementing Zero Trust Architecture to Enhance Security and Resilience in the Pharmaceutical Supply Chain

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15776v1 Announce Type: new Abstract: The pharmaceutical supply chain faces escalating cybersecurity challenges threatening patient safety and operational continuity. This paper examines the transformative potential of zero trust architecture for enhancing security and resilience within this critical ecosystem. We explore the challenges posed by data breaches, counterfeiting, and disruptions and introduce the principles of continuous verification, least-privilege access, and...

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

Cyber Security News cybersecuritynews.com

A sophisticated supply chain attack has emerged targeting developers through a malicious Go module package that masquerades as a legitimate SSH brute forcing tool while covertly stealing credentials for cybercriminal operations. The package, named "golang-random-ip-ssh-bruteforce," presents itself as a fast SSH brute forcer but contains hidden functionality that exfiltrates successful login credentials to a Telegram

Exiger Named Leader in Firmware & Software Supply Chain Security

Exiger Named Leader in Firmware & Software Supply Chain Security

Cyber Security - AI-Tech Park ai-techpark.com

Tech Market Analyst Omdia Recognizes Exiger's Comprehensive Offering and Technical Leadership in SBOM Analysis and AI-Driven Vulnerability Management Exiger, the market-leading supply chain AI company and largest provider of supply chain technology to the U.S. Federal Government, was named a Leader in Omdia's debut sector assessment, Market Radar: Firmware and Software...

Blue Yonder Acquires Optoro to Boost Returns Management Tech

Blue Yonder Acquires Optoro to Boost Returns Management Tech

Cyber Security - AI-Tech Park ai-techpark.com

Strategic acquisition of U.S.-based technology company to enhance Blue Yonder's warehouse and in-store returns processing capabilities, delivering a comprehensive returns management solution Product returns create friction for consumers, negatively impact profit margins for companies, and result in significant inefficiencies in inventory utilization throughout the supply chain. To combat these challenges, Blue...

BloodHound for Supply chains + Tech Stack Mapping (Feedback Wanted from Red & Blue Teams)

BloodHound for Supply chains + Tech Stack Mapping (Feedback Wanted from Red & Blue Teams)

cybersecurity www.reddit.com

Hey, I'm wanna build a tool that maps software supply chain attack paths. Think of it like BloodHound for builds and dependencies: instead of AD paths, Raider shows how packages flow from public registries into CI/CD pipelines and ultimately production. It highlights risky dependencies, hidden fetches, and potential paths an attacker could exploit. For Red Teams Visualize realistic attack paths through a target's supply chain. Map a company's actual tech stack (frameworks, registries,...

A Taxonomy and Methodology for Proof-of-Location Systems

A Taxonomy and Methodology for Proof-of-Location Systems

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.14230v1 Announce Type: new Abstract: Digital societies increasingly rely on trustworthy proofs of physical presence for services such as supply-chain tracking, e-voting, ride-sharing, and location-based rewards. Yet, traditional localization methods often lack cryptographic guarantees of where and when an entity was present, leaving them vulnerable to spoofing, replay, or collusion attacks. In response, research on Proof-of-Location (PoL) has emerged, with recent approaches combining...

Mitre Techniques on Legitimate Saas Backup Vendor PDF

Mitre Techniques on Legitimate Saas Backup Vendor PDF

CrowdStrike www.reddit.com

So I received a PDF to sign to resell backup services. I don't open any attachments on my main machine so I opened it in a dedicated machine and ran it through hybrid analysis/ Falcon Sandbox. The report came back with 10 indicators that were mapped to 7 attack techniques and 4 tactics. I'm wondering how likely this is to be a malicious PDF and if it's possible theres an issue in their supply chain? No specific threat was found. I contacted them about it, but they completely ignore my questions...

The Supply Chain Paradox: When "Hardened" Images Become a Vendor Lock-in Trap

The Supply Chain Paradox: When "Hardened" Images Become a Vendor Lock-in Trap

Docker www.docker.com

The market for pre-hardened container images is experiencing explosive growth as security-conscious organizations pursue the ultimate efficiency: instant security with minimal operational overhead. The value proposition is undeniably compelling - hardened images with minimal dependencies promise security "out of the box," enabling teams to focus on building and shipping applications rather than constantly revisiting low-level configuration management.

Parter & Gaia Dynamics Partner to Automate Electronics Tariffs

Parter & Gaia Dynamics Partner to Automate Electronics Tariffs

Cyber Security - AI-Tech Park ai-techpark.com

With U.S. tariffs on the horizon, Parter and Gaia aim to help manufacturers reduce risk and automate trade workflows for electronics manufacturers Parter, the AI-native platform for electronics lifecycle and supply chain intelligence, and Gaia Dynamics, the leading AI-driven trade compliance platform, today announced a strategic partnership focused on enhancing platform...

Reveel Hosts First Conference for Parcel-Shipping Brands

Reveel Hosts First Conference for Parcel-Shipping Brands

Cyber Security - AI-Tech Park ai-techpark.com

Reveel Insight Will Bring Shippers, Operational, Financial, Logistics, and Supply Chain Leaders Together to Share Ideas on How Shipping Best Practices Drive Success Reveel, the only Shipping Intelligence(TM) Platform with Parcel Spend Management 2.0 (PSM 2.0) technology, invites shippers to the inaugural Reveel Insight conference. The event will present shippers, logistics and supply chain...

Red Teaming Methodology for Design Obfuscation

Red Teaming Methodology for Design Obfuscation

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.13965v1 Announce Type: new Abstract: The main goal of design obfuscation schemes is to protect sensitive design details from untrusted parties in the VLSI supply chain, including but not limited to off-shore foundries and untrusted end users. In this work, we provide a systematic red teaming approach to evaluate the security of design obfuscation approaches. Specifically, we propose security metrics and evaluation methodology for the scenarios where the adversary does not have access...

NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js

NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.13750v1 Announce Type: new Abstract: The software supply chain is an increasingly common attack vector for malicious actors. The Node.js ecosystem has been subject to a wide array of attacks, likely due to its size and prevalence. To counter such attacks, the research community and practitioners have proposed a range of static and dynamic mechanisms, including process- and language-level sandboxing, permission systems, and taint tracking. Drawing on valuable insight from these works,...

PyPI to Block Domains Resurrection Attacks by Blocking Access to 1800 Expired Domains

PyPI to Block Domains Resurrection Attacks by Blocking Access to 1800 Expired Domains

Cyber Security News cybersecuritynews.com

The Python Package Index (PyPI) has deployed a significant security enhancement to combat domain resurrection attacks, a sophisticated supply-chain attack vector that exploits expired domain names to compromise user accounts. Since early June 2025, the platform has proactively unverified over 1,800 email addresses associated with domains entering expiration phases, marking a crucial step in protecting

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

The Hacker News thehackernews.com

The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired domains to prevent supply chain attacks. "These changes improve PyPI's overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts," Mike Fiedler, PyPI safety and security engineer at the Python

Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence

Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence

Cyber Security News cybersecuritynews.com

A sophisticated supply chain attack targeting Python developers has emerged through a seemingly innocuous package named termncolor, which conceals a multi-stage malware operation designed to establish persistent access on compromised systems. The malicious package, distributed through the Python Package Index (PyPI), masquerades as a legitimate terminal color utility while secretly deploying advanced backdoor capabilities that

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

The Hacker News thehackernews.com

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior through a dependency that allows it to establish persistence and achieve code execution. The package, named termncolor, realizes its nefarious functionality through a dependency package called colorinal by means of a multi-stage malware operation, Zscaler