Explore >> Select a destination


You are here

blog.gitguardian.com
| | scribesecurity.com
1.9 parsecs away

Travel
| | Explore recent software supply chain attacks, their impact, and learn effective strategies for prevention. Discover how you can protect your organization
| | www.pillar.security
1.7 parsecs away

Travel
| | [AI summary] Pillar Security researchers have identified a new supply chain attack method called 'Rules File Backdoor' that exploits AI coding assistants like GitHub Copilot and Cursor by injecting malicious instructions into rule files, enabling hackers to silently compromise code without detection.
| | snyk.io
0.7 parsecs away

Travel
| | On the 29th of March 2024, the high-stakes investment and prolonged campaign to plant a backdoor in the Linux software library liblzma to gain access to multiple operating systems via Linux distributions was carried out by a malicious actor.
| | www.huntress.com
16.9 parsecs away

Travel
| Huntress has observed threat actors exploiting a Microsoft Windows Server Update Services (WSUS) vulnerability (CVE-2025-59287).