Please turn JavaScript on
Eclypsium | Supply Chain Security for the Modern Enterprise icon

Eclypsium | Supply Chain Security for the Modern Enterprise

Subscribe to Eclypsium | Supply Chain Security for the Modern Enterprise’s news feed.

Click on “Follow” and decide if you want to get news from Eclypsium | Supply Chain Security for the Modern Enterprise via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Eclypsium | Supply Chain Security for the Modern Enterprise comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Eclypsium | Supply Chain Security for the Modern Enterprise which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Cybersecurity Supply Chain Risk Management | Eclypsium

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.36 / day

Message History

In this episode of Below the Surface, hosts Paul Asadoorian, Chase Snyder, and guest Brian Richardson explore the evolution of firmware security, the risks of supply chain vulnerabilities, and the latest threats targeting network edge devices like Cisco ASA and FTD. They discuss historical malware like the Chernobyl virus, modern malware campaigns such as Firestarte...


Read full story

A Linux backdoor hooks the firewall data plane (LINA) on Cisco ASA and Firepower devices, persists through firmware updates, and only a full power cycle gets rid of it.

The Patch Is Not the Fix

You patched your Cisco ASA. You rebooted it. Your vulnerability scanner shows green. You closed the ticket. However, the backdoor is still there!...


Read full story

The Department of War’s Zero Trust Target Level deadline may be September 30, 2027, but for agencies responsible for device security, the practical deadline comes much sooner.

That is because some of the hardest Zero Trust controls sit inside the Device pillar, and many of those activities are scheduled early enough that they need to be operational, integrated, and ...


Read full story

CISA recently released a new cybersecurity advisory focused on defending against botnets built from compromised consumer and small-office/home-office (SOHO) routers. The advisory highlights how threat actors are actively exploiting vulnerable, internet...


Read full story