FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Supply Chain

20 articles

SC Media Supply Chain Mar 26

New Context Hub service potentially exploitable in AI supply chain attacks

AI coding agents could be injected with nefarious instructions, resulting in potential supply chain compromise, through a new proof-of-concept attack against...

T1195

SC Media →

Help Net Security Supply Chain Mar 26

Your facilities run on fragile supply chains and nobody wants to admit it

In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building...

Help Net Security →

SC Media Supply Chain Mar 25

FCC bans foreign-made routers in bid to secure supply chain

Security pros OK with FCC’s move to ban foreign routers, but say the real risk lies with unmanaged identities.

SC Media →

The Record Supply Chain Mar 25

Supply chain attack hits widely-used AI package, risks impacting thousands of companies

The incident highlights growing concerns over the security of the open-source software supply chain, where widely-used tools maintained by small teams can pr...

T1195

The Record →

SecurityWeek Supply Chain Mar 25

AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

PwC finds AI is amplifying speed and scale of attacks, as identity theft evolves into a cybercriminal supply chain. The post AI Speeds Attacks, But Identity ...

SecurityWeek →

BleepingComputer Supply Chain Mar 25

Paid AI Accounts Are Now a Hot Underground Commodity

AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and ...

T1598

BleepingComputer →

SC Media Supply Chain Mar 25

2026 SC Award winner Black Duck — Best Supply Chain Security Solution

Black Duck earns honor for delivering visibility at scale.

SC Media →

Help Net Security Supply Chain Mar 25

LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks

A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose t...

T1195

Help Net Security →

The Hacker News Supply Chain Mar 25

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

The U.S.

The Hacker News →

GBHackers Supply Chain Mar 25

FCC Blocks New Foreign Consumer Router Models Citing Serious Security Risks

On March 23, 2026, the Federal Communications Commission (FCC) officially updated its Covered List to ban all new consumer-grade routers produced in foreign ...

GBHackers →

HackRead Supply Chain Mar 24

Understanding Wiz’s Approach to Securing the AI Supply Chain

As organizations race to deploy AI, securing the rapidly expanding ecosystem of models, data, and dependencies has become a critical priority, much of which ...

T1598

HackRead →

Cyberscoop Supply Chain Mar 24

Critics call FCC router rule a ‘big swing’ that could create more supply chain uncertainty

The choice to ban all foreign-made routers instead of targeting known risks could create legal and supply chain disruptions with unclear national security re...

Cyberscoop →

HackRead Supply Chain Kubernetes Mar 23

New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper

CanisterWorm spreads via npm supply chain attack, hijacks developer accounts, targets Kubernetes clusters, and deploys destructive Kamikaze wiper payload.

T1195

HackRead →

CrowdStrike Blog Supply Chain Mar 20

From Scanner to Stealer: Inside the trivy-action Supply Chain Compromise

T1195

CrowdStrike Blog →

Qualys Blog Supply Chain Qualys Mar 19

MCP Servers Are the New Shadow IT for AI

Key Takeaways MCP servers are becoming the default wiring between AI agents and enterprise applications — but most organizations have zero visibility into wh...

T1598

Qualys Blog →

Infosecurity Magazine Supply Chain Mar 3

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches

T1195

Infosecurity Magazine →

Palo Alto Networks Supply Chain Palo Alto Networks Feb 17

2026 Unit 42 Global Incident Response Report — Attacks Now 4x Faster

Attackers are leveraging identity, AI, and supply chain exposure. Unit 42's Global 2026 IR Report reveals faster, broader, harder-to-contain threats.

Palo Alto Networks →

Infosecurity Magazine Supply Chain Amazon Feb 4

Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover

Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover at...

T1195

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Feb 2

Notepad++ Update Hijacking Linked to Hosting Provider Compromise

A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure

T1195

Infosecurity Magazine →

Infosecurity Magazine Supply Chain Jan 23

NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers

Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system

T1195

Infosecurity Magazine →

« Prev 1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA