Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Salesloft Drift Supply Chain Attack Hits Palo Alto Networks and Zscaler

An important supply chain incident has rocked the security industry by showing us that some of the biggest security enterprises are also threatened by the risk of third-party SaaS product integrations. The incident, involving Salesloft Drift, a marketing automation solution integrated with Salesforce, resulted in the threat actor getting OAuth tokens. These tokens allowed them to exfiltrate massive volumes of sensitive data about customers, including account records, case information, and contact data.

The GhostAction Supply Chain Attack: Compromised GitHub Workflows And Stolen Secrets

GitGuardian has uncovered GhostAction, a massive supply chain attack targeting 327 GitHub users and 817 repositories. Attackers injected malicious workflows that exfiltrated over 3,325 secrets, including npm, PyPI, and DockerHub tokens. Watch as GitGuardian's Senior Cybersecurity Researcher, Guillaume Valadon breaks down how this campaign unfolded, what was stolen, and what developers need to know to stay safe.

The Hidden Risks in Your Software Supply Chain: What You Need to Know in 2025 and Beyond

Modern software development thrives on speed and innovation, fueled by open-source libraries and third-party components. These resources are essential; they accelerate development cycles, reduce costs, and enable teams to bring complex projects to life. But with great reliance comes great risk. The software supply chain is under attack, and vulnerabilities hidden within can create massive security, operational, and compliance challenges.

The Cloudflare Breach: Why Supply Chain Security Can't Be an Afterthought in 2025

The cybersecurity industry woke up to yet another supply chain nightmare this week. Cloudflare, one of the world's largest web infrastructure companies, confirmed that attackers accessed 104 of their API tokens through the cascading Salesloft Drift breach. This incident perfectly illustrates why modern organizations need to rethink their approach to third-party vendor security.

Securing Healthcare's Vulnerable Supply Chain

The digital interdependence of today’s healthcare supply chain has created new systemic risks. Cybersecurity is no longer limited to internal systems, but vulnerabilities in the innumerable third-party suppliers can now expose entire networks to disruption. From patient records stored in the cloud to diagnostic tools and logistics platforms, every element is a potential entry point for attackers.

Software Supply Chain Attacks in 2025: What We Learned from Gartner

Download the Gartner 2025 Market Guide for Software Supply Chain Security (SSCS) to learn how to protect your organization. Software supply chain attacks are a top threat to enterprises worldwide. These sophisticated attacks target everything from open-source components and third-party APIs to critical DevOps toolchains. If you’re building software, your supply chain is a prime target.

Abusing supply chains: How poisoned models, data, and third-party libraries compromise AI systems

The AI ecosystem is rapidly changing, and with this growth comes unique challenges in securing the infrastructure and services that support it. In Part 1 of this series, we explored how attackers target the underlying resources that host and run AI applications, such as cloud infrastructure and storage. In this post, we'll look at threats that affect AI-specific resources in supply chains, which are the software and data artifacts that determine how an AI service operates.

Netskope BEAM: Open Source Detector for Supply Chain Compromise

Netskope Threat Labs is pleased to announce the release of a new open-source tool that detects supply chain attacks. Our new tool, Behavioral Evaluation of Application Metrics (BEAM), requires no endpoint agent deployment and will analyze the network traffic you are already capturing in your organization to determine if your applications are communicating with unusual hosts that could be part of an attack. This tool is the subject of a 2025 Black Hat USA briefing.

Fortify Your Software Supply Chain with Veracode

Cyber attacks on the software supply chain are soaring, putting your applications and your business at unprecedented risk. But what if you could fortify your defenses, accelerate innovation securely, and stay ahead of every threat? Veracode Supply Chain Security helps you protect your organization from supply chain attacks with a powerful, unified approach to protecting your supply chain.