mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

12K
active users

#supplychainsecurity

1 post1 participant0 posts today
techi<p>Fermilab Cyberattack Contained, But Raises Red Flags.<br />Hackers hit Fermilab via a Microsoft SharePoint flaw, but damage was minimal and no classified data was accessed. Experts warn it&#39;s part of a growing trend of cyberattacks targeting U.S. research and energy systems.</p><p><a href="https://mstdn.social/tags/Fermilab" class="mention hashtag" rel="tag">#<span>Fermilab</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="tag">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="tag">#<span>Microsoft</span></a> <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="tag">#<span>SharePoint</span></a> <a href="https://mstdn.social/tags/DOE" class="mention hashtag" rel="tag">#<span>DOE</span></a> <a href="https://mstdn.social/tags/HackingAlert" class="mention hashtag" rel="tag">#<span>HackingAlert</span></a> <a href="https://mstdn.social/tags/NNSA" class="mention hashtag" rel="tag">#<span>NNSA</span></a> <a href="https://mstdn.social/tags/SupplyChainSecurity" class="mention hashtag" rel="tag">#<span>SupplyChainSecurity</span></a> <a href="https://mstdn.social/tags/CyberAttack2025" class="mention hashtag" rel="tag">#<span>CyberAttack2025</span></a> <a href="https://mstdn.social/tags/TechNews" class="mention hashtag" rel="tag">#<span>TechNews</span></a></p><p>Read Full Article Here :- <a href="https://www.techi.com/fermilab-cyberattack-microsoft-sharepoint-flaw/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">techi.com/fermilab-cyberattack</span><span class="invisible">-microsoft-sharepoint-flaw/</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>Popular Python package <code>num2words</code> v0.5.15 was flagged as compromised after being published without a GitHub tag. Linked to the "Scavenger" threat actor, it was quickly removed from PyPI. Projects using automated tools may have already pulled the malicious version. Check and downgrade if needed. </p><p><a href="https://www.stepsecurity.io/blog/supply-chain-security-alert-num2words-pypi-package-shows-signs-of-compromise" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stepsecurity.io/blog/supply-ch</span><span class="invisible">ain-security-alert-num2words-pypi-package-shows-signs-of-compromise</span></a></p><p><a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
kpcyrd 🏴<p>Malware was recently found in some popular npm pkgs:<br><a href="https://socket.dev/blog/npm-is-package-hijacked-in-expanding-supply-chain-attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/npm-is-package</span><span class="invisible">-hijacked-in-expanding-supply-chain-attack</span></a></p><p>I checked the affected versions against the whatsrc.org dataset, while most of the packages (eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, is) have been seen in SBOM used by Linux distributions, the compromised versions aren't in the dataset.</p><p>Looks like it got caught early enough. <a href="https://chaos.social/tags/supplychainsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychainsecurity</span></a> <a href="https://chaos.social/tags/archlinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>archlinux</span></a></p>
LMG Security<p>Federal Cybersecurity Cuts Increase the Risks for Your Organization</p><p>A sweeping executive order just wiped out key federal cybersecurity mandates—including SBOMs, encryption standards, and phishing-resistant MFA requirements. If your business buys software, handles sensitive data, or supports critical infrastructure, this rollback directly impacts you.</p><p>Find out:</p><p> ▪ Which protections were cut<br> ▪ Why the risk has shifted to your organization<br> ▪ What security leaders must do now to fill the gap</p><p>Read our blog: <a href="https://www.lmgsecurity.com/federal-cybersecurity-cuts-raise-risks-heres-how-to-respond/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/federal-cybers</span><span class="invisible">ecurity-cuts-raise-risks-heres-how-to-respond/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/FederalCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FederalCybersecurity</span></a> <a href="https://infosec.exchange/tags/SBOM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBOM</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/ThirdPartyRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThirdPartyRisk</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a></p>
Pyrzout :vm:<p>High-Value NPM Developers Compromised in New Phishing Campaign <a href="https://www.securityweek.com/high-value-npm-developers-compromised-in-new-phishing-campaign/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/high-value-np</span><span class="invisible">m-developers-compromised-in-new-phishing-campaign/</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a></p>
Pyrzout :vm:<p>High-Value NPM Developers Compromised in New Phishing Campaign <a href="https://www.securityweek.com/high-value-npm-developers-compromised-in-new-phishing-campaign/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/high-value-np</span><span class="invisible">m-developers-compromised-in-new-phishing-campaign/</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a></p>
Manuel Bissey<p>China warns of foreign backdoors in tech—on land and under the sea. A geopolitical tech tug-of-war is reshaping global supply chain trust. 🌍🔍<br><a href="https://cyberplace.social/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://cyberplace.social/tags/GeopoliticalCyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeopoliticalCyberRisk</span></a></p><p><a href="https://go.theregister.com/feed/www.theregister.com/2025/07/23/china_backdoor_alerts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/23/china_backdoor_alerts/</span></a></p>
Hackread.com<p>🚨 A fake npm website tricked a maintainer into giving up their token, letting attackers push malware into popular JS packages.</p><p>Details: <a href="https://hackread.com/fake-npm-website-used-push-malware-via-stolen-token/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackread.com/fake-npm-website-</span><span class="invisible">used-push-malware-via-stolen-token/</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="tag">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/npm" class="mention hashtag" rel="tag">#<span>npm</span></a> <a href="https://mstdn.social/tags/JavaScript" class="mention hashtag" rel="tag">#<span>JavaScript</span></a> <a href="https://mstdn.social/tags/infosec" class="mention hashtag" rel="tag">#<span>infosec</span></a> <a href="https://mstdn.social/tags/supplychainsecurity" class="mention hashtag" rel="tag">#<span>supplychainsecurity</span></a></p>
Sean Martin 🎙️✨:verified_paw: :donor:<p>What’s Heating Up Before Black Hat? 🔥<br>AI agents, cloud risks, GRC shifts, identity chaos… or something else entirely?</p><p>Join us live as we place our bets on the 4 trends that will shape this year’s hacker conference—and invite you to do the same.</p><p>🧠 Insight from leading voices<br>🎤 Hosted by <span class="h-card" translate="no"><a href="https://infosec.exchange/@seanmartin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>seanmartin</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://infosec.exchange/@Marcociappelli" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Marcociappelli</span></a></span> <br>📅 Streamed live on July 31st, before Black Hat kicks off</p><p>👉 Register now: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crowdcast.io/c/whats-heating-u</span><span class="invisible">p-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</span></a></p><p><a href="https://infosec.exchange/tags/BlackHat2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat2025</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/GRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRC</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/IdentitySecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentitySecurity</span></a> <a href="https://infosec.exchange/tags/ITSPmagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSPmagazine</span></a> <a href="https://infosec.exchange/tags/InfosecEvents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecEvents</span></a></p>
Cyfinoid Research<p><strong>Introducing SBOM Play: A Privacy-First SBOM Explorer with Vulnerability &amp; License Insights</strong></p> <p>SBOM Play is a lightweight, browser-based tool designed to visualize and explore Software Bill of Materials (SBOMs), enhancing software supply chain management. It offers features like dependency graphs, license breakdowns, and vulnerability mapping, ensuring user privacy without complex setups or data uploads. Open source and user-friendly.</p> <p><a href="https://cyfinoid.com/introducing-sbom-play-a-privacy-first-sbom-explorer-with-vulnerability-license-insights/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyfinoid.com/introducing-sbom-</span><span class="invisible">play-a-privacy-first-sbom-explorer-with-vulnerability-license-insights/</span></a></p>
Olaf<p><span class="h-card" translate="no"><a href="https://troet.cafe/@pixelschubsi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pixelschubsi</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@Lilith" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Lilith</span></a></span> du vergleist Äpfel mit Birnen. Das eine ist eine proprietär Software und das andere ein Protokoll. Geht also am Themen <a href="https://krefeld.life/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> vorbei.</p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>Helm v3.18.3 and earlier are vulnerable to local code execution via a crafted Chart.yaml and symlinked Chart.lock. Exploit occurs during dependency updates. Patched in v3.18.4.</p><p><a href="https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/helm/helm/security/</span><span class="invisible">advisories/GHSA-557j-xg8c-q2mm</span></a></p><p><a href="https://infosec.exchange/tags/Helm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Helm</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/GoLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoLang</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a></p>
Manuel Bissey<p>🛑 Ingram Micro confirms ransomware crippled operations, halting orders and services globally. SafePay claims responsibility, citing network misconfigurations.<br><a href="https://cyberplace.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://cyberplace.social/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> 🧷🌐</p><p><a href="https://go.theregister.com/feed/www.theregister.com/2025/07/06/ingram_micro_confirms_ransomware_behind/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/06/ingram_micro_confirms_ransomware_behind/</span></a></p>
Pyrzout :vm:<p>Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025 – Source: securityboulevard.com <a href="https://ciso2ciso.com/best-software-composition-analysis-sca-tools-top-6-solutions-in-2025-source-securityboulevard-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/best-software-co</span><span class="invisible">mposition-analysis-sca-tools-top-6-solutions-in-2025-source-securityboulevard-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBloggersNetwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBloggersNetwork</span></a> <a href="https://social.skynetcloud.site/tags/ApplicationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApplicationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBoulevard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBoulevard</span></a> <a href="https://social.skynetcloud.site/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://social.skynetcloud.site/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a></p>
Manuel Bissey<p>🥦 Whole Foods supplier UNFI restores core systems after a cyberattack—supply chain resilience under pressure as investigations continue.<br><a href="https://cyberplace.social/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://cyberplace.social/tags/RetailCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RetailCyber</span></a> 🛒🔧</p><p><a href="https://www.bleepingcomputer.com/news/security/whole-foods-supplier-unfi-restores-core-systems-after-cyberattack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/whole-foods-supplier-unfi-restores-core-systems-after-cyberattack/</span></a></p>
Bryce Kunz<p>Package thieves are getting smarter, using devices to find GPS trackers. 🕵️‍♂️ The new countermove? Stealthy trackers that only 'wake up' and send signals when cargo *moves*, making them way harder to detect! <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a><br><a href="https://archive.is/RxRgP" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/RxRgP</span><span class="invisible"></span></a></p>
Paul Reynolds :verified:<p>NIS2: It’s not just an EU thing.</p><p>A quiet shift in cybersecurity regulation is about to make noise – and UK businesses need to pay attention.</p><p>NIS2 massively expands the original NIS Directive. More sectors. More requirements. More pressure on leadership to actually care about cyber risk.</p><p>If your business touches the EU (or works with suppliers who do), it could be in scope – even if you’re based in the UK. And even if it’s not mandatory, aligning with NIS2 is quickly becoming a mark of credibility.</p><p>🔒 Risk-based security<br>⏱ Rapid incident reporting<br>🔗 Supply chain accountability<br>📈 Leadership-level responsibility</p><p>Not sure if you’re affected? Want to get ahead of the game? Let’s talk.</p><p>Compliance is moving fast. I’ll help you keep up 👽</p><p><a href="https://paulreynolds.uk/nis2-compliance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">paulreynolds.uk/nis2-complianc</span><span class="invisible">e/</span></a></p><p><a href="https://infosec.exchange/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Compliance</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/YDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YDC</span></a> <a href="https://infosec.exchange/tags/CyberEssentials" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberEssentials</span></a> <a href="https://infosec.exchange/tags/ISO27001" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISO27001</span></a> <a href="https://infosec.exchange/tags/Leadership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leadership</span></a></p>
Manuel Bissey<p>📧 Vendor Email Compromise (VEC) attacks are on the rise—more stealthy, more targeted, and harder to detect than ever. Trust alone isn’t a defense. Stay vigilant. <a href="https://cyberplace.social/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a> 🕵️ <a href="https://cyberplace.social/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> 🔐</p><p><a href="https://www.helpnetsecurity.com/2025/06/09/vendor-email-compromise-attacks-vec/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/09</span><span class="invisible">/vendor-email-compromise-attacks-vec/</span></a></p>
Pyrzout :vm:<p>React Native Aria Packages Backdoored in Supply Chain Attack <a href="https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/react-native-</span><span class="invisible">aria-packages-backdoored-in-supply-chain-attack/</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a></p>
Pyrzout :vm:<p>React Native Aria Packages Backdoored in Supply Chain Attack <a href="https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/react-native-</span><span class="invisible">aria-packages-backdoored-in-supply-chain-attack/</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a></p>