UINAT
NewsRankingsCompaniesGuidesBreachesCompliance
TagsAbout
Home/Tags/supply chain

supply chain

17 articles tagged with "supply chain".

Clop Exploits Oracle E-Business Suite Zero-Days in Massive Extortion Campaign

The Clop ransomware group weaponized CVE-2025-61882 and CVE-2025-61884 to breach nearly 100 organizations including Allianz UK, GlobalLogic, Envoy Air, Harvard, and Washington Post, with ransom demands reaching $50 million.

February 5, 2026 ClopransomwareOracle

Metro4Shell: Critical React Native CLI Vulnerability Actively Exploited Against Developers

CVE-2025-11953 in React Native CLI's Metro Development Server is being exploited in the wild to deploy Rust-based malware on developer systems, with attacks observed since December 2025.

February 4, 2026 React NativevulnerabilityRCE

DockerDash Vulnerability in Ask Gordon AI Enables Code Execution via Image Metadata

Noma Labs discovered a critical flaw in Docker's Ask Gordon AI assistant allowing attackers to hijack AI reasoning through malicious image metadata, leading to remote code execution or data exfiltration.

February 3, 2026 DockerAI securityvulnerability

Notepad++ Update Mechanism Hijacked by Chinese Threat Actors to Deliver Malware

Lotus Blossom APT compromised Notepad++'s hosting provider to intercept update traffic and deliver the Chrysalis backdoor to targeted government and financial organizations over a six-month period.

February 2, 2026 supply chainmalwareChina

400+ Malicious OpenClaw Skills Flood ClawHub With Info-Stealing Malware

Over 400 malicious OpenClaw AI agent skills on ClawHub deploy Atomic Stealer via ClickFix-style social engineering. The hightower6eu account alone published 314 malicious skills targeting crypto and developer credentials.

February 2, 2026 OpenClawMoltBotmalware

Secure Software Development Lifecycle: Building Security In

Comprehensive guide to integrating security throughout the software development lifecycle, covering AI code assistant risks, supply chain security, SBOM requirements, and modern SAST/DAST tooling.

February 2, 2026 SDLCDevSecOpsapplication security

Third-Party Risk Management: A Practical Guide

A comprehensive guide to managing cybersecurity risks from vendors, suppliers, and service providers, covering assessment frameworks, continuous monitoring, regulatory requirements, and incident response for third-party breaches.

February 2, 2026 third-party riskvendor managementsupply chain

Software Supply Chain Security: From SBOM to SLSA

A practical guide to securing your software supply chain, covering SBOM generation, SLSA provenance, dependency management, CI/CD pipeline hardening, and regulatory requirements including the EU Cyber Resilience Act.

February 2, 2026 supply chainSBOMSLSA

Malicious VS Code Extensions Steal Code from 1.5 Million Developers

Two VS Code extensions masquerading as AI coding assistants—ChatMoss and ChatGPT中文版—exfiltrated source code, API keys, and proprietary algorithms from 1.5 million developers to servers in China.

February 2, 2026 supply chainVS Codedeveloper tools

eScan Antivirus Update Server Breached, Trojanized Updates Distributed to Customers

Attackers compromised an eScan regional update server on January 20, 2026, distributing signed malicious updates that deployed a multi-stage backdoor. IOCs and detection guidance included.

January 29, 2026 supply chainantiviruseScan

Fake AI Coding Assistant on VS Code Marketplace Drops ScreenConnect RAT

A malicious VS Code extension posing as an AI coding assistant deploys ConnectWise ScreenConnect for persistent remote access using quadruple impersonation tactics and Rust-based backup delivery.

January 29, 2026 VS Codemalwaresupply chain

eScan Antivirus Supply Chain Compromise — Trojanized Update Distributed

Attackers breached an eScan regional update server and distributed signed malicious updates with backdoor capabilities during a two-hour window on January 20.

January 29, 2026 supply chainantiviruseScan

xz Utils Backdoor: The Most Sophisticated Supply Chain Attack Since SolarWinds

In March 2024, a Microsoft engineer accidentally discovered a backdoor in xz Utils that had been planted by an attacker who spent nearly three years building trust in the open-source community. The near-miss could have compromised millions of Linux servers.

January 28, 2026 supply chainopen sourceLinux

Malicious PyPI Packages Masquerading as Spellcheckers Deliver RAT Malware

Packages 'spellcheckerpy' and 'spellcheckpy' downloaded over 1,000 times use multi-layer encryption and fileless execution to deliver cryptocurrency-stealing RAT. Same threat actor linked to November 2025 campaign.

January 21, 2026 supply chainPyPImalware

Ledger Customer Data Exposed After Third-Party Breach at Global-e

Crypto hardware wallet maker Ledger disclosed that customer names, addresses, and order data were exposed after hackers breached e-commerce partner Global-e. No wallet keys or recovery phrases were compromised.

January 6, 2026 LedgerGlobal-ecryptocurrency

CDK Global Ransomware Attack: How One Vendor Crippled 15,000 Auto Dealerships

A BlackSuit ransomware attack on CDK Global, the dominant dealer management system provider, shut down operations at 15,000 auto dealerships for nearly two weeks in June 2024, causing over $1 billion in losses and exposing critical supply chain risks.

January 6, 2026 ransomwareBlackSuitCDK Global

MOVEit Transfer — Cl0p Mass Exploitation Affects 2,700+ Organizations

The Cl0p ransomware group exploited a zero-day vulnerability in Progress Software's MOVEit Transfer, compromising over 2,700 organizations and exposing data of 95+ million individuals in one of the largest mass exploitation events ever.

August 20, 2025 MOVEitCl0pzero-day
SYS ONLINE
PAGES 963
UPDATED 2026-02-06
UINAT

Security news, vulnerability alerts, and expert resources for professionals who defend the perimeter.

// Sections

  • › News
  • › Rankings
  • › Companies
  • › Breaches

// Resources

  • › Guides
  • › Compliance
  • › Tags
  • › About

// Feeds

  • › All Content
  • › News Only
  • › Breaches Only

> © 2026 UINAT. All rights reserved.

[ DEFEND THE PERIMETER ]

Search