CISOs’ role in identifying tech components and managing supply chains

In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive visibility. Warfield also discusses the vital co… Continue reading CISOs’ role in identifying tech components and managing supply chains

Why resilience leaders must prepare for polycrises

In this Help Net Security video, Frank Shultz, CEO of Infinite Blue, discusses how more frequent and severe disruptions and our increasingly interconnected world collide to create a new threat for resilience leaders to manage: polycrises. These multipl… Continue reading Why resilience leaders must prepare for polycrises

The reality of hacking threats in connected car systems

With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity c… Continue reading The reality of hacking threats in connected car systems

New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise

Researchers detail a CI/CD attack leading to PyTorch releases compromise via GitHub Actions self-hosted runners.
The post New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise appeared first on SecurityWeek.
Continue reading New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise

Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack 

Self-hosted GitHub Actions runners could allow attackers to inject malicious code into repositories, leading to supply chain attacks.
The post Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack  appeared first on Se… Continue reading Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack 

Supply chain emerges as major vector in escalating automotive cyberattacks

In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive suppliers,… Continue reading Supply chain emerges as major vector in escalating automotive cyberattacks

Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies

US, UK, and Poland warn of Russia-linked cyberespionage group’s broad exploitation of recent TeamCity vulnerability.
The post Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies appeared first on SecurityWeek.
Continue reading Russian Cyberspies Exploiting TeamCity Vulnerability at Scale: Government Agencies

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain

The number of cyber breaches targeting organizations’ supply chains continues to rise, with an average 4.16 breaches reported to be negatively impacting operations this year — a 26% increase from the mean number of 3.29 breaches in 2022, accordin… Continue reading Organizations prefer a combination of AI and human analysts to monitor their digital supply chain

SCS 9001 2.0 reveals enhanced controls for global supply chains

In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses SCS 9001 Release 2.0, a certifiable standard crafted to assist organizations in operationalizing the NIST and other government guidelines and frameworks. Enha… Continue reading SCS 9001 2.0 reveals enhanced controls for global supply chains