To address supply chain attacks, the latest Firmware Integrity Measurement (FIM) specification, released by Trusted Computing Group, provides a framework to establish the integrity baseline of the firmware running on a device at the manufacturing stage.
Palo Alto Networks’ researchers discovered that 96% of cloud containers on public registries were prone to vulnerabilities and misconfigurations that could result in a supply chain attack.
Lazarus hacking group found to be developing capabilities in supply chain attacks and using the MATA framework to conduct cyber espionage on the defense industry.
A new survey reveals deepening frustration with legacy IT vendors such as Microsoft, as supply chain attacks and ransomware attacks fed by vulnerabilities in their software become the "new normal.”