White House Aims to Strengthen Internet Routing Security

https://www.whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security The White House has outlined a plan to enhance the security of the Border Gateway Protocol (BGP), the fundamental...

New Supply Chain Attack Hijacks Removed PyPI Packages

Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk A novel supply chain attack technique targeting the Python Package Index (PyPI) registry has been identified and exploited in the wild. Dubbed “Revival Hijack,”...

Cyberattack Disrupts Transport for London Services

https://tfl.gov.uk/campaign/cyber-security-incident Transport for London (TfL) has been impacted by a cyberattack, causing disruptions to staff systems and limited availability of services for passengers. The attack occurred on Sunday, prompting TfL to implement...
5 Steps for Securing Your Software Supply Chain

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...

AI-Powered Voice Cloning Scams on the Rise

https://www.sans.org/newsletters/ouch/phantom-voices-defend-against-voice-cloning-attacks A disturbing new trend has emerged in the world of scams – the use of artificial intelligence (AI) to clone voices and deceive unsuspecting victims. Margaret, a retired teacher,...