CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Supply Chain Attack
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Attack

Bug on laptop keyboard showing malware distributed to ASUS computers in a massive supply chain attack
Cyber SecurityNews

ASUS Supply Chain Attack Highlights New Security Vulnerability For Tech Giants

April 15, 2019
A massive supply chain attack had distributed malware to tens of thousands of ASUS computers worldwide through legitimate ASUS software updates. It appears as if the attackers had inside information about ASUS servers and systems. Read More
Computers in IT service provider office showing vulnerability for supply chain attacks
Cyber SecurityNews

Supply Chain Attack on Wipro Highlights Service Provider Vulnerabilities

April 24, 2019
Vulnerable IT service providers are becoming entry points for supply chain attacks as seen in the recent attack on Wipro. The attack follows closely after Wipro CEO declares "security cannot be a show stopper for business priorities". Read More
Online shopping logo on mobile phone showing the broadening of supply chain attacks by Magecart cybercrime group
Cyber SecurityNews

Magecart Supply Chain Attacks Gaining in Popularity and Intensity

May 27, 2019
Magecart cybercrime group appears to have broaden their supply chain attacks to target more sites by going after third-party advertising vendors that works with media or entertainment websites. Read More
Cybercrime hand reaching out at laptop showing devastation of Blackbaud ransomware devastating supply chain attack
Cyber SecurityNews

Blackbaud Ransomware Demonstrates the Potential Devastation Caused by Supply Chain Attacks

September 14, 2020
It took two months for the public to learn of the Blackbaud ransomware supply chain attack, and has led to data breaches in more than a hundred universities and nonprofit organizations. Read More
Dam of the Alcantara Swamp showing SolarWinds Hack impact on critical infrastructure
Cyber SecurityNews

SolarWinds Hack Possibly Affected Critical Infrastructure Entities, Federal, State, And Local Government Agencies

January 1, 2021
CISA says that SolarWinds hack possibly affected federal, state, and local government agencies and critical infrastructure entities dealing with gas, electricity, and manufacturing. Read More
Developer sitting comfy holding hands behind head looking many monitors showing mock supply chain attack
Cyber SecurityNews

Researcher Hacks 35 Major Companies In A Mock Supply Chain Attack

February 18, 2021
The supply chain attack method leverages commonly-used dependency managers and private or non-existent dependencies to install malicious code and backdoors in internal applications. Read More

Latest

KIA logo on a bumper of new car in showroom showing impact of DoppelPaymer ransomware attack

Kia Motors America Suffers a $20 Million Suspected DoppelPaymer Ransomware Attack

Doctor and patient discussing current health examination using tablet showing rise in healthcare cyber attacks

Healthcare Cyber Attacks Rise by 55%, Over 26 Million in the U.S. Impacted

SHAREit app with magnifying on smartphone screen showing file-sharing app security flaw

SHAREit Android File-Sharing App Security Flaw Exposes Users to Remote Code Execution and Sensitive Data Leaks

Hook picking up key on keyboard showing phishing attacks

The Fault in Our Emails: Why Everyone Still Falls for Phishing Attacks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results