Please turn JavaScript on
header-image

Eclypsium | Supply Chain Security for the Modern Enterprise

Subscribe to Eclypsium | Supply Chain Security for the Modern Enterprise’s news feed.

Click on “Follow” and decide if you want to get news from Eclypsium | Supply Chain Security for the Modern Enterprise via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Eclypsium | Supply Chain Security for the Modern Enterprise comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Eclypsium | Supply Chain Security for the Modern Enterprise which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Cybersecurity Supply Chain Risk Management | Eclypsium

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.39 / day

Message History

The FCC recently announced a ban on the sale of consumer-grade internet routers manufactured outside the United States. More specifically, the FCC received a National Security Determination that caused them to update their “Covered List,” to include all foreign-m...


Read full story

In this episode, the hosts discuss the new FCC regulations regarding consumer routers, exploring the implications for cybersecurity, the definitions of what constitutes a router, and the challenges of manufacturing compliant devices. They delve into the debate surrounding the effectiveness of these regulations in mitigating cyber risks, the role of hardware versus s...


Read full story

As endpoint security and other layers of the security stack strengthen, attackers are shifting focus to an often-overlooked vulnerability: the hardware and firmware layers that traditional security tools don’t protect.

The post


Read full story

A vulnerability in F5 BIG-IP systems that allows unauthenticated remote code execution by attackers has been added to the CISA Known Exploited Vulnerabilities catalog. CVE-2025-53521 was disclosed on October 15, 2025, but only added to the KEV on March 27, 2026. The vulnerability was originally given a severity score of 7.5, but was adjusted upward to 9.8 when new information...


Read full story