Please turn JavaScript on
header-image

Eclypsium | Supply Chain Security for the Modern Enterprise

Subscribe to Eclypsium | Supply Chain Security for the Modern Enterprise’s news feed.

Click on “Follow” and decide if you want to get news from Eclypsium | Supply Chain Security for the Modern Enterprise via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Eclypsium | Supply Chain Security for the Modern Enterprise comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Eclypsium | Supply Chain Security for the Modern Enterprise which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Cybersecurity Supply Chain Risk Management | Eclypsium

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.25 / day

Message History

9 vulnerabilities across 4 vendors turn low-cost IP-KVMs into attack platforms

Compromise the KVM, Compromise Everything

Compromising a KVM device gives an attacker the equivalent of physical access to every machine connected to it. Not “kind of like” physical access. Actual keyboard, video, and mouse control, at the BIOS level, belo...


Read full story
New Malware Highlights Increased Systematic Targeting of Network Infrastructure

The enterprise attack surface has undergone a fundamental shift. Over recent years, threat actors, ranging from sophisticated nation-state APTs to financially motivated ransomware groups, have increased the frequency of systematic exploitation of network infrastructure. Eclypsi...


Read full story
Learnings from the XZ Utils Supply Chain Compromise

The XZ Utils backdoor (CVE-2024-3094) was discovered in March 2024 and is an example of a software supply chain attack that would have allowed hackers in possession of a spe...


Read full story

In this episode of Below the Surface, Paul Asadoorian, Vlad Babkin, and Adrian Sanabria discuss the ongoing vulnerabilities in network edge devices, the implications of legacy systems like Avanti, and the strategies employed by threat actors. They explore the importance of monitoring and detection in cybersecurity, as well as innovative deception techniques to enhan...


Read full story