New Supply Chain Attack Hijacks Removed PyPI Packages

Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk A novel supply chain attack technique targeting the Python Package Index (PyPI) registry has been identified and exploited in the wild. Dubbed “Revival Hijack,”...

Cyberattack Disrupts Transport for London Services

https://tfl.gov.uk/campaign/cyber-security-incident Transport for London (TfL) has been impacted by a cyberattack, causing disruptions to staff systems and limited availability of services for passengers. The attack occurred on Sunday, prompting TfL to implement...
5 Steps for Securing Your Software Supply Chain

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...

AI-Powered Voice Cloning Scams on the Rise

https://www.sans.org/newsletters/ouch/phantom-voices-defend-against-voice-cloning-attacks A disturbing new trend has emerged in the world of scams – the use of artificial intelligence (AI) to clone voices and deceive unsuspecting victims. Margaret, a retired teacher,...

Critical Vulnerability Found in Airport Security System

https://ian.sh/tsa A significant security flaw has been discovered in FlyCASS, a web-based service used by some airlines to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). The vulnerability could have potentially allowed...