New Supply Chain Attack Hijacks Removed PyPI Packages

Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk A novel supply chain attack technique targeting the Python Package Index (PyPI) registry has been identified and exploited in the wild. Dubbed “Revival Hijack,”...

Cyberattack Disrupts Transport for London Services

https://tfl.gov.uk/campaign/cyber-security-incident Transport for London (TfL) has been impacted by a cyberattack, causing disruptions to staff systems and limited availability of services for passengers. The attack occurred on Sunday, prompting TfL to implement...
5 Steps for Securing Your Software Supply Chain

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...

AI-Powered Voice Cloning Scams on the Rise

https://www.sans.org/newsletters/ouch/phantom-voices-defend-against-voice-cloning-attacks A disturbing new trend has emerged in the world of scams – the use of artificial intelligence (AI) to clone voices and deceive unsuspecting victims. Margaret, a retired teacher,...

Critical Vulnerability Found in Airport Security System

https://ian.sh/tsa A significant security flaw has been discovered in FlyCASS, a web-based service used by some airlines to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). The vulnerability could have potentially allowed...

FIDO Security Token YubiKey 5 Vulnerable to Cloning Attacks

https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf A new side-channel vulnerability has been discovered in the YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard. This vulnerability allows attackers...
Research Study: Where’s The Worst Place to Leave Your Secrets

Research Study: Where’s The Worst Place to Leave Your Secrets

What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places Researchers deployed digital tripwires disguised as AWS credentials in various public locations online to see how quickly threat actors would...