Tag: supply chain attack

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...

/ August 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: GitHub supply chain attack

Cybersecurity Threat Advisory: GitHub supply chain attack

Malicious actors have launched a software supply chain attack targeting developers on the GitHub platform. Barracuda MSP recommends taking proactive measures detailed in this Cybersecurity Threat Advisory to mitigate the risk. What is the threat? A variety of techniques were...

/ March 28, 2024

Cybersecurity Threat Advisory: 3CX supply chain attack updates

This is a follow-up to the 3CX supply chain attack threat advisory. A malware was found in the 3CX VoIP Desktop Application, which has been delivered to users through legitimate 3CX updates. 3CX has since released security updates, and below...

/ March 31, 2023
More cybersecurity trends to watch for this year

More cybersecurity trends to watch for this year

The champagne flutes have been put away, and the last Christmas ornaments are boxed up. 2022 is officially in the rearview mirror, and all eyes are on 2023 and its opportunities and challenges. Let’s look at areas where we expect...

/ January 11, 2023
Tech time warp
Beware of growing software supply chain attacks

Beware of growing software supply chain attacks

Software supply chain attacks have been increasingly bedeviling the IT space. Recent statistics bear out the dangers of these attacks. According to a study by Israel-based Argon security: Supply chain attacks grew by more than 300 percent in 2021 over...

/ December 7, 2022
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment