🔗 𝐀𝐥𝐥 𝐤𝐧𝐨𝐰𝐧 𝐬𝐮𝐩𝐩𝐥𝐲-𝐜𝐡𝐚𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐡𝐢𝐬𝐭𝐨𝐫𝐲 thomas strömberg has curated a dataset on software supply-chain attacks. 56 OSS projects, 59 incidents. Criteria: when an open-source project or commercial product distributed malware knowingly or unknowingly. One YAML file per incident. https://lnkd.in/gvT3r_R6 #cybersecurity
Supply-chain attacks through history: 56 OSS projects, 59 incidents
More Relevant Posts
-
Software supply chain attacks increased by 300%. Hackers now inject malicious code into trusted apps and updates. A routine software installation can compromise your system. - How do software supply chain attacks work? - What makes these new cyber attacks so hard to detect? - How can you protect your computer from a corrupted update? #web3 #cybersecurity #supplychainattacks #malware #infosec
Media Attachment
To view or add a comment, sign in
-
⚠️ CVE-2018-25117: CRITICAL VestaCP software compromised with malware, leaking admin credentials, installing DDoS bot. Users urged to check for vulnerabilities. Take action to protect against cyber attacks. Source : https://lnkd.in/evbAPAb9 #CVE201825117 #CVE #CyberSecurity #Vulnerability #CVEFind #CVEFindAlert
To view or add a comment, sign in
-
-
The danger of Trojan malware lies in its deceptive appearance; it often resembles a normal app, file, or update. However, once installed, it can silently collect sensitive data, install additional malicious software, create hidden back-doors for remote access, or even hijack system resources; all without the user’s knowledge. This highlights the importance of having a proactive cybersecurity team; and why CyberOnyx is here to shield businesses before threats ever take hold. #CyberSecurity #TrojanMalware #DataProtection #ITSecurity #CyberOnyx #ThreatPrevention
To view or add a comment, sign in
-
-
Cybercriminals don’t just exploit systems — they exploit trust. Whether you’re an individual or an organization, small steps like verifying links, updating software, and training teams can make a big difference. Stay alert. Stay secure. Stay ahead of the hack. #CyberSecurity #XAVSLabsResearch #DigitalSafety #CyberAwareness
To view or add a comment, sign in
-
-
Last Mile Reassembly attacks completely bypass SWG defenses by smuggling known malware through network proxies and reassembling it client-side. The attacks work because SWGs can only analyze individual network requests without understanding that multiple chunks belong to the same browser session. Palo Alto Networks has acknowledged these attacks "assemble inside the browser and bypass traditional secure web gateways," validating what our research demonstrated at DEF CON. Learn more about how they work at https://hubs.la/Q03MfYqP0 #cybersecurity #browsersecurity #enterprisesecurity Vivek Ramachandran
To view or add a comment, sign in
-
⚙️ Outdated software = open doors for hackers. Automate updates wherever possible to stay secure without the hassle. 🛡️ 👉 https://zurl.co/R7x0J #CyberSecurity #PatchManagement #Zevonix
To view or add a comment, sign in
-
-
⚙️ Outdated software = open doors for hackers. Automate updates wherever possible to stay secure without the hassle. 🛡️ 👉 https://zurl.co/R7x0J #CyberSecurity #PatchManagement #Zevonix
To view or add a comment, sign in
-
-
Think downloading an AI-powered tool will make your life easier? Think again. ⚠️ EvilAI, a sophisticated trojan, mimics vendor portals and leverages malicious ads and lures users into installing software that blends real functionality with hidden payloads. 🛡️ Dive into our latest #ThreatAdvisoryTuesday update to learn more about this malware and other emerging risks: https://okt.to/neNERt #CyberSecurity #MalwareAlert #CyberThreat
To view or add a comment, sign in
-
-
💡 Did you know cybercriminals use embedded code in email images to install malware? With one misplaced click, a virus can infiltrate your systems. Discover how to prevent these attacks during Cybersecurity Awareness Month. #Cybersecurity #TechSecurity #CyberDefense https://bit.ly/3HQ0tUx
To view or add a comment, sign in
-
-
New cybersecurity update:China Exploited New VMware Bug for Nearly a Year #Cybersecurity #ITSecurity #InfoSechttps://https://ift.tt/8cKktyP A seemingly benign privilege-escalation process in VMware and other software has likely benefited attackers and other malware strains for years, researchers noted. via darkreading https://ift.tt/rZiopOH September 30, 2025 at 11:41PM
To view or add a comment, sign in
Incredible dataset! thanks for sharing this, Clint. What stood out to me is how over half of the incidents involve compromise at the distribution layer, not the codebase itself. It reinforces how modern AppSec needs to go beyond SAST/DAST and look at the entire software delivery pipeline: CD configs, artifact storage, package managers, even post-release integrity checks. It also highlights the urgent need for attestation and provenance in CI/CD. Signing isn’t just a compliance checkbox anymore, it’s the bare minimum to detect tampering across build and deploy stages. Kudos to Thomas for the structured YAML format too, perfect for feeding into threat modeling and detection pipelines.