CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Supply Chain Attacks
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Attacks

Connecting tracks and microchips showing supply chain attacks
Cyber SecurityInsights

Securing Supply Chains Against the Threat of Attacks

January 7, 2022
To address supply chain attacks, the latest Firmware Integrity Measurement (FIM) specification, released by Trusted Computing Group, provides a framework to establish the integrity baseline of the firmware running on a device at the manufacturing stage.
Read More
Virtual locks and shields against digital background showing cloud containers resulting in supply chain attack
Cyber SecurityNews

Most Cloud Containers Deployed on Public Registries Contain Vulnerabilities and Misconfigurations That Could Result In a Supply Chain Attack

October 15, 2021
Palo Alto Networks’ researchers discovered that 96% of cloud containers on public registries were prone to vulnerabilities and misconfigurations that could result in a supply chain attack.
Read More
Hacker pointing to code on a computer monitor in a dark room showing supply chain attacks
Cyber SecurityNews

North Korean Lazarus Hacking Group Leverages Supply Chain Attacks To Distribute Malware for Cyber Espionage

November 5, 2021
Lazarus hacking group found to be developing capabilities in supply chain attacks and using the MATA framework to conduct cyber espionage on the defense industry.
Read More
Business woman hand using computer with padlock security interface showing supply chain attacks and ransomware attacks
Cyber SecurityNews

Legacy IT Vendors Losing Trust as Supply Chain Attacks, Ransomware Attacks Run Rampant

December 10, 2021
A new survey reveals deepening frustration with legacy IT vendors such as Microsoft, as supply chain attacks and ransomware attacks fed by vulnerabilities in their software become the "new normal.”
Read More

Latest

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results