CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Supply Chain Attacks
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Attacks

Connecting tracks and microchips showing supply chain attacks
Cyber SecurityInsights

Securing Supply Chains Against the Threat of Attacks

January 7, 2022
To address supply chain attacks, the latest Firmware Integrity Measurement (FIM) specification, released by Trusted Computing Group, provides a framework to establish the integrity baseline of the firmware running on a device at the manufacturing stage.
Read More
Business woman hand using computer with padlock security interface showing supply chain attacks and ransomware attacks
Cyber SecurityNews

Legacy IT Vendors Losing Trust as Supply Chain Attacks, Ransomware Attacks Run Rampant

December 10, 2021
A new survey reveals deepening frustration with legacy IT vendors such as Microsoft, as supply chain attacks and ransomware attacks fed by vulnerabilities in their software become the "new normal.”
Read More
Hacker pointing to code on a computer monitor in a dark room showing supply chain attacks
Cyber SecurityNews

North Korean Lazarus Hacking Group Leverages Supply Chain Attacks To Distribute Malware for Cyber Espionage

November 5, 2021
Lazarus hacking group found to be developing capabilities in supply chain attacks and using the MATA framework to conduct cyber espionage on the defense industry.
Read More
Virtual locks and shields against digital background showing cloud containers resulting in supply chain attack
Cyber SecurityNews

Most Cloud Containers Deployed on Public Registries Contain Vulnerabilities and Misconfigurations That Could Result In a Supply Chain Attack

October 15, 2021
Palo Alto Networks’ researchers discovered that 96% of cloud containers on public registries were prone to vulnerabilities and misconfigurations that could result in a supply chain attack.
Read More

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results