Articles tagged with: #supply-chain Clear filter
Top 10 Best Supply Chain Intelligence Security Companies in 2025

Top 10 Best Supply Chain Intelligence Security Companies in 2025

Cyber Security News cybersecuritynews.com

The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber supply chain attacks. As companies rely more heavily on open-source software, third-party code, and cloud-native applications, the need for supply chain intelligence security solutions has never been greater. In 2025, organizations must adopt highly reliable platforms that provide visibility, compliance,

Reproducible Builds for Quantum Computing

Reproducible Builds for Quantum Computing

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.02251v1 Announce Type: cross Abstract: Reproducible builds are a set of software development practices that establish an independently verifiable path from source code to binary artifacts, helping to detect and mitigate certain classes of supply chain attacks. Although quantum computing is a rapidly evolving field of research, it can already benefit from adopting reproducible builds. This paper aims to bridge the gap between the quantum computing and reproducible builds communities....

TAIBOM: Bringing Trustworthiness to AI-Enabled Systems

TAIBOM: Bringing Trustworthiness to AI-Enabled Systems

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.02169v1 Announce Type: cross Abstract: The growing integration of open-source software and AI-driven technologies has introduced new layers of complexity into the software supply chain, challenging existing methods for dependency management and system assurance. While Software Bills of Materials (SBOMs) have become critical for enhancing transparency and traceability, current frameworks fall short in capturing the unique characteristics of AI systems -- namely, their dynamic,...

Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm

Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm

AWS Security Blog aws.amazon.com

Building on top of open source packages can help accelerate development. By using common libraries and modules from npm, PyPI, Maven Central, NuGet, and others, teams can focus on writing code that is unique to their situation. These open source package registries host millions of packages that are integrated into thousands of programs daily. Unfortunately,

Supply chain security is impossible when every dependency has dependencies with vulnerabilities

Supply chain security is impossible when every dependency has dependencies with vulnerabilities

cybersecurity www.reddit.com

I just finished a scan on what we thought was a well-maintained project. Turns out, my direct dependencies are all clean.. not a single critical vulnerability. I felt pretty good. Then I let the scanner go deeper. That's when it found it: a critical RCE in a tiny, forgotten library buried five layers deep in node_modules . The maintainer hasn't touched it in years. Now I'm staring at a full fork and patching job that could break everything else. It feels completely hopeless. How is anyone...

Sentry: Authenticating Machine Learning Artifacts on the Fly

Sentry: Authenticating Machine Learning Artifacts on the Fly

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.00554v1 Announce Type: new Abstract: Machine learning systems increasingly rely on open-source artifacts such as datasets and models that are created or hosted by other parties. The reliance on external datasets and pre-trained models exposes the system to supply chain attacks where an artifact can be poisoned before it is delivered to the end-user. Such attacks are possible due to the lack of any authenticity verification in existing machine learning systems. Incorporating...

Evolving Enterprise Defense to Secure the Modern AI Supply Chain

Evolving Enterprise Defense to Secure the Modern AI Supply Chain

The Hacker News thehackernews.com

The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also

VU#534320: NPM supply chain compromise exposes challenges to securing the ecosystem from credential theft and self-propagation

VU#534320: NPM supply chain compromise exposes challenges to securing the ecosystem from credential theft and self-propagation

CERT Recently Published Vulnerability Notes kb.cert.org

Overview A major npm supply chain compromise was disclosed by the software supply chain security company Socket on September 15, 2025. At the time of writing, over 500 packages have been affected, and the number continues to grow. The attack involves a self-propagating malware variant dubbed Shai-Hulud , which spreads via credential theft and automated package publishing. The campaign escalated rapidly, including compromise of packages published by CrowdStrike. This notice aims to raise...

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

The Hacker News thehackernews.com

Cybersecurity researchers have discovered what has been described as the first-ever instance of a malicious Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called "postmark-mcp" that copied an official Postmark Labs library of the same name.

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

Cyber Security News cybersecuritynews.com

Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet keys. Two fraudulent packages, faster_log and async_println, have infiltrated the Rust package registry by impersonating the legitimate fast_log logging library, embedding malicious code that scans source files for Solana and Ethereum private keys before exfiltrating

Malicious Rust Crates Steal Solana and Ethereum Keys  -  8,424 Downloads Confirmed

Malicious Rust Crates Steal Solana and Ethereum Keys - 8,424 Downloads Confirmed

The Hacker News thehackernews.com

Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and Ethereum wallet keys from source code. The crates, named faster_log and async_println, were published by the threat actor under the alias rustguruman and dumbnbased on May 25, 2025, amassing 8,424 downloads in total, according to software supply chain