#supply-chain-risk

[ follow ]
Information security
fromTechCrunch
4 days ago

Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks | TechCrunch

AI adoption and vibe coding expand attack surfaces as both developers and attackers use AI tools, causing insecure implementations, prompt-driven exploits, and supply-chain risks.
fromTechCrunch
1 week ago

Jaguar Land Rover to pause production until next week - at least | TechCrunch

Luxury car-maker Jaguar Land Rover will not resume production at its factories for yet another week as it continues to grapple with fallout from a cyberattack. In early September, the Jaguar Land Rover stopped production at its factories in the U.K. after it was impacted by a cyberattack in which hackers stole company data. Jaguar Land Rover has not said what data was stolen.
Information security
UK news
fromwww.bbc.com
1 week ago

JLR shutdown extended again as ministers meet suppliers

Jaguar Land Rover production remains suspended until at least October 1 due to a late‑August cyber attack, threatening suppliers and prompting government engagement.
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

CISOs must prioritize preserving institutional trust and business continuity by securing complex relationships, supply chains, and adapting to AI-driven attacks and regulatory changes.
fromTheregister
3 weeks ago

AI-powered penetration tool downloaded 10K times

Villager, a new penetration-testing tool linked to a suspicious China-based company and described by researchers as "Cobalt Strike's AI successor," has been downloaded about 10,000 times since its release in July. The package, published on Python Package Index, operates as a Model Context Protocol (MCP) client and integrates multiple security tools. It includes Kali Linux, which legitimate defenders use to automate penetration testing, and it contains hundreds of tools that can also be used to launch cyber attacks at scale.
Python
Information security
fromSecuritymagazine
3 weeks ago

Critical Steps to Strengthening Satellite Network Security

Securing satellite networks from jamming, spoofing, hacking, supply-chain vulnerabilities, and human error is essential to prevent catastrophic disruptions to navigation, finance, and emergency services.
fromBusiness Matters
3 weeks ago

Clear Insurance Management Advises Retailers to Boost Security Measures Post M&S Cyber Scare

In the recent M&S breach, only £100 million of cyber insurance was in place, far short of the £300 million in damages incurred, leaving the retail giant significantly underinsured. With more retailers relying heavily on online operations and third-party platforms, the financial impact of operational downtime from data breaches can be severe and widespread. Yet many businesses still lack adequate-or any-cyber insurance.
Information security
#cybersecurity
Information security
fromSecuritymagazine
4 weeks ago

378 GB of Data From Navy Federal Credit Union Exposed

A publicly exposed 378.7 GB database linked to Navy Federal Credit Union contained sensitive backups, logs, and business logic, enabling credential-stuffing, phishing, and supply-chain risks.
US politics
fromFortune
4 weeks ago

Federal appeals court tariff ruling signals CFOs to 'plan for turbulence'

Most Trump-era tariffs were ruled illegal by a federal appeals court, creating near-term uncertainty while tariffs may remain pending appeals and possible reimposition.
fromTheregister
1 month ago

Frostbyte10 bugs put grocery refrigeration devices at risk

Ten vulnerabilities in Copeland controllers, which are found in thousands of devices used by the world's largest supermarket chains and cold storage companies, could have allowed miscreants to manipulate temperatures and spoil food and medicine, leading to massive supply-chain disruptions. The flaws, collectively called Frostbyte10, affect Copeland E2 and E3 controllers, used to manage critical building and refrigeration systems, such as compressor groups, condensers, walk-in units, HVAC, and lighting systems. Three received critical-severity ratings.
Information security
[ Load more ]