Remove state-of-security supply-chain-compromise-risks-you-need-know
article thumbnail

3CX Desktop App Supply Chain Attack Targets Millions – Known Facts and First Expert Comments

CyberSecurity Insiders

News is breaking about a software supply chain attack on the 3CX voice and video conferencing software. 3CX, the company behind 3CXDesktopApp, states to have more than 600,000 customers and 12 million users in 190 countries. Notable names include American Express, BMW, Honda, Ikea, Pepsi, and Toyota.

article thumbnail

2022 Cybersecurity Trends and Predictions

CyberSecurity Insiders

Of course, those things will continue to get attention, but it doesn’t take a security expert or any special insight to “predict” that. Of course, those things will continue to get attention, but it doesn’t take a security expert or any special insight to “predict” that. Lior Div, CEO and Co-founder, Cybereason. Predictions”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Simple Principles for Software Supply Chain Risk Management

SecureWorld News

Threats to software supply chains became a public issue when the U.S. GAO (Government Accountability Office) called out four national security agencies over the inadequacies of their supply chain security practices. Software enables everything, so its compromise threatens the very basis of our society.

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

As if cybersecurity weren’t already a red-letter issue, the United States and, most likely, its allies–in other words, the global economic community–are in Iran’s cyber sites, a major player in cyber warfare and politically divisive disinformation campaigns. So, how do you know if it’s happening?

Passwords 245
article thumbnail

Introducing SLSA, an End-to-End Framework for Supply Chain Integrity

Google Security

Posted Kim Lewandowski, Google Open Source Security Team & Mark Lodato, Binary Authorization for Borg Team Supply chain integrity attacks—unauthorized modifications to software packages—have been on the rise in the past two years, and are proving to be common and reliable attack vectors that affect all consumers of software.

Software 145
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security. I learned quite bit, and I hope you will, too.

article thumbnail

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

Security Boulevard

Identity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party cloud service companies that provide identity management and software composition analysis. Know the risks of pushing your crown jewels into other services running in the cloud.

Risk 122