OWASP Jakarta
  • Home
  • Meetup
    • Meetup.com
  • Sitemap
  • Contact

Chain

Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
News

Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack

Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack The developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with Read more…

By adminowasp, 5 months ago
News

LottieFiles ends crypto wallet-targeting supply chain attack • The Register

LottieFiles ends crypto wallet-targeting supply chain attack • The Register LottieFiles is overcoming something of a Halloween fright after battling to regain control of a compromised developer account that was used to exploit users’ crypto wallets. Nattu Adnan, co-founder and CTO at LottieFiles – best known for its popular website Read more…

By adminowasp, 7 monthsNovember 1, 2024 ago
Supply Chain Attacks
News

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks. “Attackers can leverage these entry points Read more…

By adminowasp, 7 months ago
Software Supply Chain
News

Practical Guidance For Securing Your Software Supply Chain

Practical Guidance For Securing Your Software Supply Chain The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come as no surprise. In the last several years, the software supply chain has become an increasingly attractive target for Read more…

By adminowasp, 11 months ago
Polyfill Supply Chain Attack
News

Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack

Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack Jun 26, 2024NewsroomSupply Chain Attack / Web Security Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired the domain and modified the JavaScript library (“polyfill.js”) to redirect users to Read more…

By adminowasp, 11 months ago
New R Programming Vulnerability Exposes Projects to Supply Chain Attacks
News

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results in code execution when loaded and referenced. The flaw, assigned Read more…

By adminowasp, 1 year ago
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
News

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to breach even the most formidable defenses. But what if you could turn Read more…

By adminowasp, 1 year ago
Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
News

Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others

Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the GitHub organization account associated with Top.gg, a Discord bot discovery site. “The threat actors used multiple TTPs in this attack, including Read more…

By adminowasp, 1 year ago
Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
News

Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end of the attacks is to deliver malicious downloaders for Windows and macOS that deploy a Read more…

By adminowasp, 1 year ago
New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
News

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks Cybersecurity researchers have found that it’s possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models submitted by users and result in supply chain attacks. “It’s possible to send malicious pull requests with attacker-controlled data Read more…

By adminowasp, 1 year ago

Posts pagination

1 2 Next
  • Blog
  • Contact
  • GDPR
  • Meetup
  • SiteMap
Hestia | Developed by ThemeIsle