Oplium Threat LabsReassessing Polyfill.io Supply Chain Attack — Greater Impact, Detection, and MitigationTLP:WHITEJun 28
InfosecTrainWhat is a Supply Chain Attack?A supply chain attack is a cyber attack that strategically targets the software or hardware supply chain to compromise the security of the…Jan 25
Tal SperlingReverse Shell Through Third-Party LibrariesDISCLAIMER: The use of the following code, methods etc… is for educational and legal penetration testing only. Use at your own risk. Do not…Jun 22Jun 22
Genex LogisticsSupply Chain Attacks: Impact, Examples, and 6 Preventive MeasuresIn an era dominated by digital connectivity, the intricate web of global supply chains has become both a lifeline and a vulnerability for…Jan 4Jan 4
Oplium Threat LabsReassessing Polyfill.io Supply Chain Attack — Greater Impact, Detection, and MitigationTLP:WHITEJun 28
InfosecTrainWhat is a Supply Chain Attack?A supply chain attack is a cyber attack that strategically targets the software or hardware supply chain to compromise the security of the…Jan 25
Tal SperlingReverse Shell Through Third-Party LibrariesDISCLAIMER: The use of the following code, methods etc… is for educational and legal penetration testing only. Use at your own risk. Do not…Jun 22
Genex LogisticsSupply Chain Attacks: Impact, Examples, and 6 Preventive MeasuresIn an era dominated by digital connectivity, the intricate web of global supply chains has become both a lifeline and a vulnerability for…Jan 4
Syed Abeer AhmedCVE-2024–3094 XZ Compression Tool Supply Chain Attack [ The XZ Backdoor ]Exposing the XZ Compression Tool Supply Chain Attack: A Call for Cybersecurity AwarenessApr 2
Configr TechnologiesinSystem WeaknessThe Growing Threat of Supply Chain AttacksAre You the Next Target?Apr 11
Roman TolstosheyevSoftware Supply Chain Attacks: How a Container Can Be SubstitutedThis article is intended solely for educational purposes, aiming to raise awareness about cyber security and hacking techniques. It does…Apr 2