Open source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with ...
Current cybersecurity development risk frameworks don’t cover all of the tactics hackers used to compromise SolarWinds, log4j ...
Stay informed with the latest in cybersecurity trends, vulnerabilities, and best practices. Don't miss out on this week's ...
CVE-2025-30066 supply chain attack compromised tj-actions on March 14, 2025, exposing 218 repositories and leaking credentials.
Only 42% of companies discover breaches through their own security teams. CISOs are often “blind” to third-party security ...
The Register on MSN5d
Too many software supply chain defense bibles? Boffins distill adviceHow to avoid another SolarWinds, Log4j, and XZ Utils situation Organizations concerned about software supply chain attacks ...
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially ...
In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the ...
The compromise of GitHub Action tj-actions/changed-files has impacted only a small percentage of the 23,000 projects using it ...
The global supply chain is the backbone of the world’s economy. From suppliers and manufacturers to transporters, retailers, ...
Lineaje, the full-lifecycle software supply chain security company, today announced the appointments of Intekhab Nazeer as ...
The report originated from Unit 42, the threat intelligence division of Palo Alto Networks, which identified that the attacker had specifically targeted ‘agentkit’, an open-source toolkit managed by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results