Supply
-
Blog
DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers’ systems. Sophos was brought in to investigate the attack and believe the threat actors exploited a chain of older SimpleHelp vulnerabilities tracked as CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726 to breach the system. SimpleHelp is…
Read More » -
Blog
Supply chain attack hits npm package with 45,000 weekly downloads
An npm package named ‘rand-user-agent’ has been compromised in a supply chain attack to inject obfuscated code that activates a remote access trojan (RAT) on the user’s system. The ‘rand-user-agent‘ package is a tool that generates randomized user-agent strings, which is helpful in web scraping, automated testing, and security research. Although the package has been deprecated, it remains fairly popular,…
Read More » -
Blog
Magento supply chain attack compromises hundreds of e-stores
A supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging to a $40 billion multinational. Sansec researchers who discovered the attack report that some extensions were backdoored as far back as 2019, but the malicious code was only activated in April 2025. “Multiple vendors were hacked in a coordinated supply…
Read More » -
Blog
Huawei set to ship 910C AI chips at scale, signaling shift in global AI supply chain
“From a performance standpoint, Nvidia’s new-generation chips — such as the B200 and the upcoming B300 Ultra, based on TSMC’s 4nm process and equipped with advanced HBM3/3E memory — have significantly widened the gap compared to Huawei’s 910C, which is likely built on SMIC’s N+2 7nm process (effectively 14nm) and lacks advanced HBM memory,” said Neil Shah, partner and co-founder…
Read More » -
Blog
Tech Tariff Exemptions Are Temporary, Looking at ‘Whole Electronics Supply Chain’
U.S. President Donald Trump. Image: Gage Skidmore/Creative Commons U.S. President Donald Trump and his team have stated that the reciprocal tariff exemptions on electronic products are temporary. The administration excluded smartphones, computers, semiconductors, and other tech items from the 125% tariff on Chinese imports on April 11. Trump said his team is taking a look at the “whole electronics supply…
Read More » -
Blog
AI-hallucinated code dependencies become new supply chain risk
A new class of supply chain attacks named ‘slopsquatting’ has emerged from the increased use of generative AI tools for coding and the model’s tendency to “hallucinate” non-existent package names. The term slopsquatting was coined by security researcher Seth Larson as a spin on typosquatting, an attack method that tricks developers into installing malicious packages by using names that closely…
Read More » -
Blog
China’s rare earth export controls threaten enterprise IT hardware supply chains
China has announced immediate export controls on seven more rare earth elements critical to enterprise IT hardware manufacturing, firing a fresh salvo in the ongoing tech trade war. This move could significantly impact tech giants including Dell Technologies, HP, Apple, and IBM, along with semiconductor leaders such as Intel, Samsung, and TSMC. The new controls issued by China’s State Council require export…
Read More » -
Blog
GitHub Action hack likely led to another in cascading supply chain attack
A cascading supply chain attack that began with the compromise of the “reviewdog/action-setup@v1” GitHub Action is believed to have led to the recent breach of “tj-actions/changed-files” that leaked CI/CD secrets. Last week, a supply chain attack on the tj-actions/changed-files GitHub Action caused malicious code to write CI/CD secrets to the workflow logs for 23,000 repositories. If those logs had been…
Read More » -
Blog
Supply chain attack on popular GitHub Action exposes CI/CD secrets
A supply chain attack on the widely used ‘tj-actions/changed-files’ GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. The GitHub Action is a very popular automation tool designed for GitHub Actions workflows. It allows developers to identify files changed in a pull request or commit and take actions based on…
Read More » -
Blog
Organizations urged to act fast after GitHub Action supply chain attack
More than 20,000 organizations may be at risk following a supply chain attack affecting tj-actions/changed-files GitHub Action. GitHub Actions is a continuous integration and continuous delivery (CI/CD) service that enables developers to automate software builds and tests. Workflows are triggered by specific events, for example when new code is committed to the repository. Used in more than 23,000 repositories, tj-actions/changed-files…
Read More »