Hydrochasma: An Emerging Threat to Asia’s Medical and Shipping Industries

A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.

Read Full Article

Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks

Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.

Full Publication

Assess Your Supply Chain in Line with NIST C-SCRM

Virtual Event

Mar 1, 2023

Time: 10:00 AM – 12:30 PM ET

Location: Web Conference

Assess Your Supply Chain in Line with NIST C-SCRM 

The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy. 

Register Now:

US will see more new battery capacity than natural gas generation in 2023

Earlier this week, the US’ Energy Information Agency (EIA) gave a preview of the changes the nation’s electrical grid is likely to see over the coming year. The data is based on information submitted to the Department of Energy by utilities and power plant owners, who are asked to estimate when generating facilities that are planned or under construction will come online. Using that information, the EIA estimates the total new capacity expected to be activated over the coming year.

Read Full Article

Mature Your Zero Trust Program: Use Cases for 2023

Virtual Event -Feb 22 2023

Time -10:00 AM – 12:30 PM CT

Location-Web Conference

Applying zero trust architectures in an iterative way – one project at a time – has proven a sustainable method to deepen zero trust capabilities across a program. This symposium covers popular zero trust use cases for 2023 to accelerate your organization’s zero trust maturation.

Register Now

Manufacturer’s Contexts, Supply Chain Risk Management, and Agility Performance

he dynamism of the current business environment emanates significant challenges and disruption risks for supply chains. These vulnerabilities in contemporary supply chains have motivated a substantial academic focus on supply chain risk management (SCRM). In the empirical literature on SCRM, a firm’s external environment is conceptualized as a source of risk, and various organizational and technological factors are discussed as influencers of SCRM. 

Full Publication

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product. Firmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations.

Read Full Article