chain

  • Blog

    DragonForce ransomware abuses SimpleHelp in MSP supply chain attack

    The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers’ systems. Sophos was brought in to investigate the attack and believe the threat actors exploited a chain of older SimpleHelp vulnerabilities tracked as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726 to breach the system. SimpleHelp is…

    Read More »
  • Blog

    Supply chain attack hits npm package with 45,000 weekly downloads

    An npm package named ‘rand-user-agent’ has been compromised in a supply chain attack to inject obfuscated code that activates a remote access trojan (RAT) on the user’s system. The ‘rand-user-agent‘ package is a tool that generates randomized user-agent strings, which is helpful in web scraping, automated testing, and security research. Although the package has been deprecated, it remains fairly popular,…

    Read More »
  • Blog

    Magento supply chain attack compromises hundreds of e-stores

    A supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging to a $40 billion multinational. Sansec researchers who discovered the attack report that some extensions were backdoored as far back as 2019, but the malicious code was only activated in April 2025. “Multiple vendors were hacked in a coordinated supply…

    Read More »
  • Blog

    Craft CMS RCE exploit chain used in zero-day attacks to steal data

    Two vulnerabilities impacting Craft CMS were chained together in zero-day attacks to breach servers and steal data, with exploitation ongoing, according to CERT Orange Cyberdefense. The vulnerabilities were discovered by Orange Cyberdefense’s CSIRT, which was called in to investigate a compromised server. As part of the investigation, they discovered that two zero-day vulnerabilities impacting Craft CMS were exploited to breach the…

    Read More »
  • Blog

    Huawei set to ship 910C AI chips at scale, signaling shift in global AI supply chain

    “From a performance standpoint, Nvidia’s new-generation chips — such as the B200 and the upcoming B300 Ultra, based on TSMC’s 4nm process and equipped with advanced HBM3/3E memory — have significantly widened the gap compared to Huawei’s 910C, which is likely built on SMIC’s N+2 7nm process (effectively 14nm) and lacks advanced HBM memory,” said Neil Shah, partner and co-founder…

    Read More »
  • Blog

    Tech Tariff Exemptions Are Temporary, Looking at ‘Whole Electronics Supply Chain’

    U.S. President Donald Trump. Image: Gage Skidmore/Creative Commons U.S. President Donald Trump and his team have stated that the reciprocal tariff exemptions on electronic products are temporary. The administration excluded smartphones, computers, semiconductors, and other tech items from the 125% tariff on Chinese imports on April 11. Trump said his team is taking a look at the “whole electronics supply…

    Read More »
  • Blog

    AI-hallucinated code dependencies become new supply chain risk

    A new class of supply chain attacks named ‘slopsquatting’ has emerged from the increased use of generative AI tools for coding and the model’s tendency to “hallucinate” non-existent package names. The term slopsquatting was coined by security researcher Seth Larson as a spin on typosquatting, an attack method that tricks developers into installing malicious packages by using names that closely…

    Read More »
  • Blog

    Revealing a Sophisticated Malware Delivery Chain

    The Acronis Threat Research Unit (TRU) was presented with an interesting threat chain and malware sample for analysis that involved a known cyberthreat along with some interesting twists in targeting and obfuscation. In this article, we’ll dissect the complex malware delivery chain and tactics. The focus will be on a multi-stage infection process involving Visual Basic Script (VBS), a batch…

    Read More »
  • Blog

    GitHub Action hack likely led to another in cascading supply chain attack

    A cascading supply chain attack that began with the compromise of the “reviewdog/action-setup@v1” GitHub Action is believed to have led to the recent breach of “tj-actions/changed-files” that leaked CI/CD secrets. Last week, a supply chain attack on the tj-actions/changed-files GitHub Action caused malicious code to write CI/CD secrets to the workflow logs for 23,000 repositories. If those logs had been…

    Read More »
  • Blog

    Supply chain attack on popular GitHub Action exposes CI/CD secrets

    A supply chain attack on the widely used ‘tj-actions/changed-files’ GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. The GitHub Action is a very popular automation tool designed for GitHub Actions workflows. It allows developers to identify files changed in a pull request or commit and take actions based on…

    Read More »
Back to top button
close