ClickCease Supply Chain Cybersecurity Attacks Archives - TuxCare

How Attackers Abuse Entry Points...

Supply chain attacks have become a growing concern, particularly with the rise of open source packages and libraries across various programming languages. These attacks exploit vulnerabilities in the software supply...

Navigating Open-Source Supply Chain Threats:...

In today’s business world, companies are determined to create software faster than ever before. Developers are under immense pressure to deliver products to customers quickly. To accelerate this process, developers...

Free Download Manager Linux Users...

Securelist has issued a concerning revelation for Linux users, unveiling that a Debian package associated with the widely-used ‘Free Download Manager’ contains malware, posing a substantial security risk to unsuspecting...

Python Package Index (PyPI) targeted...

ReversingLabs has uncovered a novel attack targeting the Python Package Index (PyPI). This attack method involves integrating malware with compiled code, exploiting the direct execution capabilities of Python byte code...

Capterra reveals rise in software...

According to a recent Capterra survey, an alarming 61% of U.S. organizations have suffered significant repercussions as a result of software supply chain vulnerabilities in the last year, underlining the...

Supply chain attack on 3CX...

Two security companies have detected a supply chain attack on 3CX, a popular communication software provider. The malware has infected the Windows Electron client, but only for customers who have...

APT37 spread malware to South...

Google’s Threat Analysis Group discovered APT37, also known as Scarcruft or Reaper, a North Korean-linked hacking group, exploiting a zero-day vulnerability in Internet Explorer’s JScript engine by delivering malicious Microsoft...

New ransomware tool uses unique...

Threat actors are now updating the data exfiltration tool Exmatter with a unique data corruption feature, which attackers could switch to perform ransomware attacks in the future. The new unique...

Owner-initiated Cybersecurity Supply Chain...

Supply chain attacks come in all forms and shapes. One example is taking over legitimate accounts to deploy malicious code into widely used libraries. Another is deploying changes during compilation...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter