New Context Hub service potentially exploitable in AI supply chain attacks
AI coding agents could be injected with nefarious instructions, resulting in potential supply chain compromise, through a new proof-of-concept attack against...
20 articles
AI coding agents could be injected with nefarious instructions, resulting in potential supply chain compromise, through a new proof-of-concept attack against...
In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building...
Security pros OK with FCC’s move to ban foreign routers, but say the real risk lies with unmanaged identities.
The incident highlights growing concerns over the security of the open-source software supply chain, where widely-used tools maintained by small teams can pr...
PwC finds AI is amplifying speed and scale of attacks, as identity theft evolves into a cybercriminal supply chain. The post AI Speeds Attacks, But Identity ...
AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and ...
Black Duck earns honor for delivering visibility at scale.
A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose t...
The U.S.
On March 23, 2026, the Federal Communications Commission (FCC) officially updated its Covered List to ban all new consumer-grade routers produced in foreign ...
As organizations race to deploy AI, securing the rapidly expanding ecosystem of models, data, and dependencies has become a critical priority, much of which ...
The choice to ban all foreign-made routers instead of targeting known risks could create legal and supply chain disruptions with unclear national security re...
CanisterWorm spreads via npm supply chain attack, hijacks developer accounts, targets Kubernetes clusters, and deploys destructive Kamikaze wiper payload.
Key Takeaways MCP servers are becoming the default wiring between AI agents and enterprise applications — but most organizations have zero visibility into wh...
Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches
Attackers are leveraging identity, AI, and supply chain exposure. Unit 42's Global 2026 IR Report reveals faster, broader, harder-to-contain threats.
Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover at...
A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure
Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system