SCRM Library Updates
A Maturity Model for supply chain risk management
Purpose Supply chains are among the most important, complex and risky systems in the modern world. Thus, managing risk is…
AI-based evaluation system for supply chain vulnerabilities and resilience amidst external shocks: An empirical approach
The study focuses on the intricacies and vulnerabilities inherent in supply chains, which are often influenced by external disruptions such…
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on May 30, 2023. These advisories provide timely information about current security…
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on May 9, 2023. These advisories provide timely information about current security…
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on April 25, 2023. These advisories provide timely information about current security…
Developing Supply Chain Capabilities Through Digitalization and Viability for Controlling the Ripple Effect
The COVID-19 pandemic affected all industries and presented manufacturing firms with enormous challenges, with considerable changes in consumer demand for…
Recent SCRM News
Alert: New Phishing Attack Delivers Keylogger Disguised as Bank Payment Notice
A new phishing campaign has been observed leveraging a novel loader malware to deliver an information stealer and keylogger called Agent…
DOD to Build Domestic Mine-to-Magnet Supply Chain
The U.S. Department of Defense (DOD) says it is on track to meet its goal of forming a domestic supply…
AT&T says leaked data of 70 million people is not from its systems
AT&T says a massive trove of data impacting 71 million people did not originate from its systems after a hacker…
Israeli Universities Hit by Supply Chain Cyberattack Campaign
Iranian hacktivists executed a supply chain attack on Israeli universities by initially breaching systems of a local technology provider to…
MiTM phishing attack can let attackers unlock and steal a Tesla
Researchers demonstrated how they could conduct a Man-in-the-Middle (MiTM) phishing attack to compromise Tesla accounts, unlocking cars, and starting them. The attack…
New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
Cybersecurity researchers have found that it’s possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models…
SCRM Events
Women in Cybersecurity (WiCyS) Conference
Thursday, April 11, 2024 – Saturday, April 13, 2024 Location type: In-person Location: Nashville TN Delivery: Live Event type: Conference CISA is…
25th Annual CERIAS Security Symposium
April 2-3 at Purdue University. Join cybersecurity leaders, practitioners, researchers, educators, at the nation’s premier cybersecurity conference that brings government,…
Critical Infrastructure Protection and Resilience North America (CIPRNA) Conference
Tuesday, March 12, 2024 – Thursday, March 14, 2024 Location type: In-person Location: Lake Charles LA Event type: Conference CISA is exhibiting and…
Beyond metrics: Defining success in cloud migration and AI integration
January 18, 20242:00 PM Webinar 1 hour No Fee Learning objectives: Where are agencies in the cloud today? Moving mission…
The Mineral Supply Chain and the New Space Race | Oversight and Investigations Subcommittee
Tuesday, December 12, 2023 | 10:15 AM On Tuesday, December 12, 2023, at 10:15 a.m., in room 1324 Longworth House…
Defend Against Ransomware Attacks Cyber Range Training (IR209)
Thursday, December 7, 2023 Time: 9:00 AM EDT – 1:00 PM EDT Location type: Virtual/Online Format: Webinar Event type: Training…