Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychain
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics
Kalyan Tamarapalli
Kalyan Tamarapalli
Kalyan Tamarapalli
Follow
Mar 23
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics
#
security
#
cybersecurity
#
devops
#
supplychain
Comments
Add Comment
3 min read
Ataque Ă Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa
Gabriel Lima Ferreira
Gabriel Lima Ferreira
Gabriel Lima Ferreira
Follow
Mar 23
Ataque Ă Cadeia de Suprimentos: O Pacote NPM Que Pode Derrubar Sua Empresa
#
supplychain
#
npm
#
devsecops
#
sca
Comments
Add Comment
2 min read
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 22
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed
#
security
#
github
#
ai
#
supplychain
Comments
Add Comment
14 min read
Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds
Scott Sage
Scott Sage
Scott Sage
Follow
Mar 22
Add Real-Time Supply Chain Risk Data to Your AI Agent in 60 Seconds
#
mcp
#
ai
#
supplychain
#
opensource
Comments
Add Comment
2 min read
ONNX `silent=True` Disables Security Checks, Exposing ML Models to Supply Chain Attacks: Solution Needed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 21
ONNX `silent=True` Disables Security Checks, Exposing ML Models to Supply Chain Attacks: Solution Needed
#
onnx
#
security
#
machinelearning
#
supplychain
Comments
Add Comment
11 min read
Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 21
Trivy Vulnerability Scanner Compromised in Supply Chain Attack: Mitigation Steps and User Guidance
#
cybersecurity
#
supplychain
#
opensource
#
vulnerability
1
 reaction
Comments
Add Comment
8 min read
Evidence Stores for Supply Chain Security
Pavel
Pavel
Pavel
Follow
Mar 20
Evidence Stores for Supply Chain Security
#
tooling
#
security
#
supplychain
#
evidence
Comments
Add Comment
3 min read
Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 20
Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns
#
security
#
supplychain
#
opensource
#
vulnerability
Comments
Add Comment
8 min read
Your AI Agent Has a Supply Chain. Nobody Is Auditing It.
ArkForge
ArkForge
ArkForge
Follow
Mar 16
Your AI Agent Has a Supply Chain. Nobody Is Auditing It.
#
security
#
agents
#
supplychain
#
auditability
1
 reaction
Comments
Add Comment
5 min read
The Global Chip Supply Chain's Hidden Weakness Isn't Silicon. It's Helium.
Kunal
Kunal
Kunal
Follow
Mar 14
The Global Chip Supply Chain's Hidden Weakness Isn't Silicon. It's Helium.
#
semiconductors
#
supplychain
#
geopolitics
#
manufacturing
Comments
1
 comment
6 min read
Nvidia GPU Smuggling: How Execs Bypassed Export Controls
Simon Paxton
Simon Paxton
Simon Paxton
Follow
Mar 20
Nvidia GPU Smuggling: How Execs Bypassed Export Controls
#
nvidia
#
gpus
#
exportcontrols
#
supplychain
1
 reaction
Comments
Add Comment
7 min read
26,000 Hidden Victims: The Supply Chain Shadow Layer You Can't See
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 3
26,000 Hidden Victims: The Supply Chain Shadow Layer You Can't See
#
supplychain
#
vendorrisk
#
databreach
#
thirdpartyrisk
Comments
Add Comment
3 min read
QuickLens Chrome Extension Compromised to Steal Crypto via ClickFix Attacks
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 1
QuickLens Chrome Extension Compromised to Steal Crypto via ClickFix Attacks
#
chromeextension
#
clickfix
#
cryptostealer
#
supplychain
Comments
Add Comment
3 min read
How Nation-States Are Poisoning LLM Training Data for Agentic AI Models
Tiamat
Tiamat
Tiamat
Follow
Mar 10
How Nation-States Are Poisoning LLM Training Data for Agentic AI Models
#
aisecurity
#
supplychain
#
llm
#
agentic
Comments
Add Comment
6 min read
The Supply Chain Attack That's Already In Your Codebase
Tiamat
Tiamat
Tiamat
Follow
Mar 9
The Supply Chain Attack That's Already In Your Codebase
#
security
#
supplychain
#
dependencies
#
devsecops
Comments
Add Comment
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account