<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity on Osmond van Hemert</title><link>https://osmondvanhemert.nl/tags/cybersecurity/</link><description>Recent content in Cybersecurity on Osmond van Hemert</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© Osmond van Hemert. All rights reserved.</copyright><lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://osmondvanhemert.nl/tags/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>Supply Chain Malware in PyTorch Lightning — When AI Infrastructure Becomes the Attack Surface</title><link>https://osmondvanhemert.nl/posts/260430-pytorch-lightning-supply-chain-malware/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/260430-pytorch-lightning-supply-chain-malware/</guid><description>A Dune-themed malware campaign targeting the PyTorch Lightning library highlights how AI/ML supply chains are becoming prime targets for sophisticated attacks.</description></item><item><title>The xz Utils Aftermath — One Year Later, What Have We Actually Fixed?</title><link>https://osmondvanhemert.nl/posts/260409-xz-utils-supply-chain-anniversary/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/260409-xz-utils-supply-chain-anniversary/</guid><description>Nearly two years after the xz Utils backdoor shocked the open source world, the supply chain security landscape has changed — but not enough.</description></item><item><title>Software Supply Chain Security Gets Serious — SLSA and SBOM Adoption Accelerates</title><link>https://osmondvanhemert.nl/posts/260312-supply-chain-security-slsa-adoption/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/260312-supply-chain-security-slsa-adoption/</guid><description>Supply chain security frameworks like SLSA and SBOM requirements are moving from recommendations to mandates. Here&amp;rsquo;s what developers need to know about the shifting landscape.</description></item><item><title>Post-Quantum Cryptography — The Migration Clock Is Ticking</title><link>https://osmondvanhemert.nl/posts/260115-nist-post-quantum-crypto-migration/</link><pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/260115-nist-post-quantum-crypto-migration/</guid><description>NIST&amp;rsquo;s post-quantum cryptography standards are finalized, and the migration timeline is no longer theoretical — it&amp;rsquo;s operational.</description></item><item><title>Ultralytics Supply Chain Attack — When Your Dependencies Bite Back</title><link>https://osmondvanhemert.nl/posts/251218-ultralytics-supply-chain-attack/</link><pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/251218-ultralytics-supply-chain-attack/</guid><description>A supply chain attack on the popular Ultralytics YOLO package highlights the persistent vulnerability of the Python ecosystem&amp;rsquo;s distribution pipeline.</description></item><item><title>The Zero-Day Treadmill — Why Patch Tuesday Still Matters in 2025</title><link>https://osmondvanhemert.nl/posts/251113-zero-day-treadmill-patch-tuesday/</link><pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/251113-zero-day-treadmill-patch-tuesday/</guid><description>November&amp;rsquo;s Patch Tuesday brought critical zero-days being actively exploited, reminding us that patch management is still the unglamorous foundation of security.</description></item><item><title>Secure by Design — CISA's Push Is Finally Gaining Real Traction</title><link>https://osmondvanhemert.nl/posts/251009-cisa-secure-by-design-traction/</link><pubDate>Thu, 09 Oct 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/251009-cisa-secure-by-design-traction/</guid><description>CISA&amp;rsquo;s Secure by Design initiative is moving from voluntary pledges to measurable industry impact, and software vendors are starting to feel the pressure.</description></item><item><title>EU ChatControl Is Back — And It's Still a Terrible Idea for Encryption</title><link>https://osmondvanhemert.nl/posts/250925-eu-chatcontrol-encryption-threat/</link><pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250925-eu-chatcontrol-encryption-threat/</guid><description>The EU&amp;rsquo;s latest push to scan encrypted messages reignites the fundamental debate about whether governments can mandate backdoors without destroying security for everyone.</description></item><item><title>AWS re:Inforce 2025 — Cloud Security Gets Serious About AI Workloads</title><link>https://osmondvanhemert.nl/posts/250619-aws-reinforce-2025-ai-security/</link><pubDate>Thu, 19 Jun 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250619-aws-reinforce-2025-ai-security/</guid><description>AWS re:Inforce 2025 puts AI workload security front and center, with new guardrails, identity controls, and data protection features that signal where cloud security is headed.</description></item><item><title>NPM Supply Chain Attacks — The Problem That Won't Go Away</title><link>https://osmondvanhemert.nl/posts/250605-npm-supply-chain-security-lessons/</link><pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250605-npm-supply-chain-security-lessons/</guid><description>Another wave of malicious npm packages reminds us that JavaScript&amp;rsquo;s dependency ecosystem remains one of software&amp;rsquo;s biggest security challenges.</description></item><item><title>The Spring 2025 Exploit Wave — Fortinet, Ivanti, and the Perimeter Problem</title><link>https://osmondvanhemert.nl/posts/250424-spring-2025-exploit-wave-fortinet-ivanti/</link><pubDate>Thu, 24 Apr 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250424-spring-2025-exploit-wave-fortinet-ivanti/</guid><description>A surge of active exploitation targeting Fortinet and Ivanti edge devices highlights the persistent vulnerability of network perimeter infrastructure.</description></item><item><title>IngressNightmare — Critical Kubernetes NGINX Vulnerability Puts Clusters at Risk</title><link>https://osmondvanhemert.nl/posts/250327-ingress-nightmare-kubernetes-vulnerability/</link><pubDate>Thu, 27 Mar 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250327-ingress-nightmare-kubernetes-vulnerability/</guid><description>CVE-2025-1974 and related vulnerabilities in the Kubernetes ingress-nginx controller allow unauthenticated remote code execution, affecting an estimated 40% of Kubernetes clusters.</description></item><item><title>The tj-actions Supply Chain Attack — Why Your CI/CD Pipeline Is an Attack Surface</title><link>https://osmondvanhemert.nl/posts/250313-github-actions-supply-chain-attack/</link><pubDate>Thu, 13 Mar 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250313-github-actions-supply-chain-attack/</guid><description>A compromised GitHub Action exposed secrets from thousands of repositories, highlighting how CI/CD pipelines have become prime targets for supply chain attacks.</description></item><item><title>Kubernetes 1.33 and the Container Security Hardening Push</title><link>https://osmondvanhemert.nl/posts/250227-kubernetes-container-security-hardening/</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250227-kubernetes-container-security-hardening/</guid><description>With Kubernetes pushing security features to GA and CISA issuing container hardening guidance, the container ecosystem is growing up on security. Here&amp;rsquo;s what matters for platform teams.</description></item><item><title>Salt Typhoon and the Treasury Breach — State-Sponsored Hacking Hits Home</title><link>https://osmondvanhemert.nl/posts/250102-salt-typhoon-treasury-breach/</link><pubDate>Thu, 02 Jan 2025 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/250102-salt-typhoon-treasury-breach/</guid><description>The Chinese state-sponsored Salt Typhoon campaign breached the US Treasury Department, exposing how even the most security-conscious organizations remain vulnerable.</description></item><item><title>Salt Typhoon — The Telecom Hack That Should Worry Every Engineer</title><link>https://osmondvanhemert.nl/posts/241219-salt-typhoon-telecom-hack/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/241219-salt-typhoon-telecom-hack/</guid><description>The Salt Typhoon campaign has compromised major US telecoms at a staggering scale. What developers and architects need to understand about this ongoing threat.</description></item><item><title>Salt Typhoon and the Telecom Breach — Infrastructure Under Siege</title><link>https://osmondvanhemert.nl/posts/241114-salt-typhoon-telecom-breach/</link><pubDate>Thu, 14 Nov 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/241114-salt-typhoon-telecom-breach/</guid><description>The Salt Typhoon campaign has compromised major US telecom providers, exposing the fragility of critical infrastructure and the growing sophistication of state-sponsored cyber operations.</description></item><item><title>CUPS Overflows — A Critical Linux Printing Vulnerability Nobody Saw Coming</title><link>https://osmondvanhemert.nl/posts/240926-cups-vulnerability-linux-printing-security/</link><pubDate>Thu, 26 Sep 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240926-cups-vulnerability-linux-printing-security/</guid><description>A chain of vulnerabilities in CUPS, the Linux printing system, enables remote code execution — and highlights how forgotten infrastructure becomes a security liability.</description></item><item><title>NIST Finalizes Post-Quantum Cryptography Standards — Time to Start Planning</title><link>https://osmondvanhemert.nl/posts/240815-nist-post-quantum-cryptography/</link><pubDate>Thu, 15 Aug 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240815-nist-post-quantum-cryptography/</guid><description>NIST has published its first three finalized post-quantum cryptography standards. Here&amp;rsquo;s what developers need to know and do.</description></item><item><title>The CrowdStrike Outage — When a Security Update Takes Down the World</title><link>https://osmondvanhemert.nl/posts/240718-crowdstrike-global-outage/</link><pubDate>Thu, 18 Jul 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240718-crowdstrike-global-outage/</guid><description>A faulty CrowdStrike Falcon sensor update has caused one of the largest IT outages in history, bricking millions of Windows machines worldwide.</description></item><item><title>regreSSHion — A Wake-Up Call Hiding in Plain Sight</title><link>https://osmondvanhemert.nl/posts/240704-regresshion-openssh-vulnerability/</link><pubDate>Thu, 04 Jul 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240704-regresshion-openssh-vulnerability/</guid><description>CVE-2024-6387 reveals a critical remote code execution flaw in OpenSSH, and it&amp;rsquo;s a regression from a fix made back in 2006.</description></item><item><title>The Polyfill.io Supply Chain Attack — A Wake-Up Call for CDN Trust</title><link>https://osmondvanhemert.nl/posts/240627-polyfill-io-supply-chain-attack/</link><pubDate>Thu, 27 Jun 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240627-polyfill-io-supply-chain-attack/</guid><description>The polyfill.io domain was acquired by a Chinese company and began injecting malware into over 100,000 websites, exposing fundamental weaknesses in how we trust third-party CDN dependencies.</description></item><item><title>Microsoft Delays Recall — When Security Concerns Actually Win</title><link>https://osmondvanhemert.nl/posts/240613-microsoft-recall-delayed-security/</link><pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240613-microsoft-recall-delayed-security/</guid><description>Microsoft pulls Windows Recall from the upcoming Copilot+ PC launch after security researchers demonstrate alarming vulnerabilities in the feature&amp;rsquo;s data storage.</description></item><item><title>RSA Conference 2024 — AI Meets Cybersecurity, For Better and Worse</title><link>https://osmondvanhemert.nl/posts/240502-rsa-conference-2024-ai-security/</link><pubDate>Thu, 02 May 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240502-rsa-conference-2024-ai-security/</guid><description>RSA Conference 2024 kicks off in San Francisco with AI dominating every conversation. But beneath the marketing buzz, there are real security challenges emerging that practitioners need to face.</description></item><item><title>The xz Utils Backdoor — Open Source's Worst Nightmare Almost Came True</title><link>https://osmondvanhemert.nl/posts/240328-xz-utils-backdoor-cve-2024-3094/</link><pubDate>Thu, 28 Mar 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240328-xz-utils-backdoor-cve-2024-3094/</guid><description>A sophisticated supply chain attack via the xz Utils compression library was caught just days before reaching stable Linux distributions.</description></item><item><title>Operation Cronos — The LockBit Takedown and What It Means for Cybersecurity</title><link>https://osmondvanhemert.nl/posts/240222-lockbit-takedown-operation-cronos/</link><pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240222-lockbit-takedown-operation-cronos/</guid><description>An international law enforcement coalition takes down the LockBit ransomware group&amp;rsquo;s infrastructure in a landmark operation.</description></item><item><title>Jenkins Under Fire — CVE-2024-23897 and the Cost of Legacy Infrastructure</title><link>https://osmondvanhemert.nl/posts/240125-jenkins-cve-2024-23897-cicd-security/</link><pubDate>Thu, 25 Jan 2024 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/240125-jenkins-cve-2024-23897-cicd-security/</guid><description>A critical Jenkins vulnerability allows arbitrary file reads through the CLI. Here&amp;rsquo;s why this matters more than your typical CVE and what it reveals about CI/CD security.</description></item><item><title>Terrapin Attack — SSH Isn't As Bulletproof As We Thought</title><link>https://osmondvanhemert.nl/posts/231221-terrapin-ssh-attack-vulnerability/</link><pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/231221-terrapin-ssh-attack-vulnerability/</guid><description>Researchers disclose the Terrapin attack against SSH, demonstrating that even our most trusted protocols can harbor subtle cryptographic weaknesses.</description></item><item><title>ICBC Ransomware Attack — When the World's Largest Bank Gets Hit</title><link>https://osmondvanhemert.nl/posts/231116-icbc-lockbit-ransomware-attack/</link><pubDate>Thu, 16 Nov 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/231116-icbc-lockbit-ransomware-attack/</guid><description>The LockBit ransomware attack on ICBC&amp;rsquo;s US operations disrupted Treasury market trading and exposed critical vulnerabilities in financial infrastructure.</description></item><item><title>HTTP/2 Rapid Reset — The Zero-Day That Hit Everyone</title><link>https://osmondvanhemert.nl/posts/231012-http2-rapid-reset-attack/</link><pubDate>Thu, 12 Oct 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/231012-http2-rapid-reset-attack/</guid><description>CVE-2023-44487 exploits a fundamental aspect of HTTP/2 to enable record-breaking DDoS attacks. Here&amp;rsquo;s what you need to know and do.</description></item><item><title>The MGM Resorts Hack — A $100M Lesson in Social Engineering</title><link>https://osmondvanhemert.nl/posts/230921-mgm-resorts-social-engineering-attack/</link><pubDate>Thu, 21 Sep 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230921-mgm-resorts-social-engineering-attack/</guid><description>The MGM Resorts cyberattack that started with a phone call is a stark reminder that the most sophisticated defenses can be undone by human vulnerability.</description></item><item><title>Intel's Downfall Vulnerability — Another Speculative Execution Headache</title><link>https://osmondvanhemert.nl/posts/230803-intel-downfall-cpu-vulnerability/</link><pubDate>Thu, 03 Aug 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230803-intel-downfall-cpu-vulnerability/</guid><description>A new Intel CPU vulnerability called Downfall exposes sensitive data through speculative execution, and the performance impact of mitigations is significant.</description></item><item><title>MOVEit Transfer: The Supply Chain Breach That Keeps Growing</title><link>https://osmondvanhemert.nl/posts/230629-moveit-breach-supply-chain-security/</link><pubDate>Thu, 29 Jun 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230629-moveit-breach-supply-chain-security/</guid><description>The MOVEit Transfer vulnerability has now impacted hundreds of organizations worldwide — a stark reminder that managed file transfer tools remain critical and under-secured attack surfaces.</description></item><item><title>MOVEit Transfer Zero-Day — Another Supply Chain Nightmare Unfolds</title><link>https://osmondvanhemert.nl/posts/230601-moveit-zero-day-supply-chain-nightmare/</link><pubDate>Thu, 01 Jun 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230601-moveit-zero-day-supply-chain-nightmare/</guid><description>A critical zero-day in Progress MOVEit Transfer is being actively exploited, and the scope of the damage is still emerging.</description></item><item><title>Google Rolls Out Passkeys — The Beginning of the End for Passwords</title><link>https://osmondvanhemert.nl/posts/230504-google-passkeys-passwords-future/</link><pubDate>Thu, 04 May 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230504-google-passkeys-passwords-future/</guid><description>Google enables passkey sign-in for all Google Accounts, marking the most significant push yet toward a passwordless future built on FIDO2 and WebAuthn.</description></item><item><title>Samsung's ChatGPT Data Leak — A Wake-Up Call for Enterprise AI Governance</title><link>https://osmondvanhemert.nl/posts/230427-samsung-chatgpt-data-leak/</link><pubDate>Thu, 27 Apr 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230427-samsung-chatgpt-data-leak/</guid><description>Samsung employees accidentally leaked proprietary source code and meeting notes via ChatGPT, exposing the urgent need for enterprise AI usage policies.</description></item><item><title>Italy Bans ChatGPT — When Privacy Regulators Meet AI</title><link>https://osmondvanhemert.nl/posts/230406-italy-chatgpt-ban-gdpr/</link><pubDate>Thu, 06 Apr 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230406-italy-chatgpt-ban-gdpr/</guid><description>Italy&amp;rsquo;s data protection authority blocks ChatGPT over GDPR concerns, setting a precedent for how AI services will navigate European privacy law.</description></item><item><title>Italy Bans ChatGPT — When GDPR and AI Collide</title><link>https://osmondvanhemert.nl/posts/230330-italy-bans-chatgpt-gdpr-ai-collision/</link><pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230330-italy-bans-chatgpt-gdpr-ai-collision/</guid><description>Italy&amp;rsquo;s data protection authority blocks ChatGPT over GDPR concerns, raising questions every company building with AI needs to answer.</description></item><item><title>The US National Cybersecurity Strategy — Software Liability Is Coming</title><link>https://osmondvanhemert.nl/posts/230309-us-national-cybersecurity-strategy-2023/</link><pubDate>Thu, 09 Mar 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230309-us-national-cybersecurity-strategy-2023/</guid><description>The Biden administration&amp;rsquo;s new cybersecurity strategy shifts liability toward software vendors, and developers need to pay attention.</description></item><item><title>ESXiArgs Ransomware — A Wake-Up Call for VMware Infrastructure</title><link>https://osmondvanhemert.nl/posts/230202-esxiargs-ransomware-vmware-esxi/</link><pubDate>Thu, 02 Feb 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230202-esxiargs-ransomware-vmware-esxi/</guid><description>A massive ransomware campaign is exploiting a two-year-old VMware ESXi vulnerability, and the scale of unpatched systems is alarming.</description></item><item><title>CircleCI's Security Incident — Rotate Your Secrets Now</title><link>https://osmondvanhemert.nl/posts/230105-circleci-security-incident/</link><pubDate>Thu, 05 Jan 2023 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/230105-circleci-security-incident/</guid><description>CircleCI discloses a security incident and urges all customers to immediately rotate secrets stored in the platform. A reminder of the risks in our CI/CD supply chain.</description></item><item><title>LastPass Breach Goes From Bad to Catastrophic — Customer Vaults Compromised</title><link>https://osmondvanhemert.nl/posts/221222-lastpass-breach-vault-data/</link><pubDate>Thu, 22 Dec 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/221222-lastpass-breach-vault-data/</guid><description>LastPass reveals attackers obtained copies of customer vault data, turning an already serious breach into one of the worst password manager incidents in history.</description></item><item><title>One Year After Log4Shell — What Actually Changed?</title><link>https://osmondvanhemert.nl/posts/221215-log4shell-one-year-later/</link><pubDate>Thu, 15 Dec 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/221215-log4shell-one-year-later/</guid><description>A year after Log4Shell shook the software industry, we examine what&amp;rsquo;s improved in supply chain security — and what still keeps us up at night.</description></item><item><title>OpenSSL's Critical Vulnerability — Lessons From a Week of Preparation</title><link>https://osmondvanhemert.nl/posts/221103-openssl-critical-vulnerability-response/</link><pubDate>Thu, 03 Nov 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/221103-openssl-critical-vulnerability-response/</guid><description>The OpenSSL 3.0.7 patch for CVE-2022-3602 and CVE-2022-3786 arrived this week — here&amp;rsquo;s what happened and what it teaches us about vulnerability response.</description></item><item><title>The Uber Breach — When MFA Isn't Enough</title><link>https://osmondvanhemert.nl/posts/220915-uber-breach-social-engineering/</link><pubDate>Thu, 15 Sep 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220915-uber-breach-social-engineering/</guid><description>A teenager allegedly breached Uber&amp;rsquo;s internal systems through social engineering and MFA fatigue, exposing fundamental weaknesses in how we think about authentication.</description></item><item><title>Twilio's Phishing Breach — Why SMS-Based 2FA Is Living on Borrowed Time</title><link>https://osmondvanhemert.nl/posts/220804-twilio-phishing-breach/</link><pubDate>Thu, 04 Aug 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220804-twilio-phishing-breach/</guid><description>Twilio&amp;rsquo;s breach through a sophisticated phishing attack targeting employees raises hard questions about SMS-based authentication and supply chain trust.</description></item><item><title>26 Million Requests Per Second — Cloudflare and the Mantis Botnet</title><link>https://osmondvanhemert.nl/posts/220707-cloudflare-mantis-record-ddos/</link><pubDate>Thu, 07 Jul 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220707-cloudflare-mantis-record-ddos/</guid><description>Cloudflare mitigated the largest HTTPS DDoS attack ever recorded at 26 million requests per second. The Mantis botnet represents a new generation of volumetric threats.</description></item><item><title>Follina — The Zero-Day That Turns a Word Doc Into a Weapon</title><link>https://osmondvanhemert.nl/posts/220602-follina-zero-day-msdt/</link><pubDate>Thu, 02 Jun 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220602-follina-zero-day-msdt/</guid><description>CVE-2022-30190, dubbed Follina, exploits Microsoft&amp;rsquo;s diagnostic tool through Office documents — no macros required.</description></item><item><title>Heroku's Security Breach — A Wake-Up Call for Platform Trust</title><link>https://osmondvanhemert.nl/posts/220421-heroku-security-breach-supply-chain/</link><pubDate>Thu, 21 Apr 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220421-heroku-security-breach-supply-chain/</guid><description>Heroku&amp;rsquo;s OAuth token breach exposes the fragile trust chain in platform-as-a-service dependencies and what it means for developers.</description></item><item><title>Spring4Shell Is Here — Assessing the Real Risk of CVE-2022-22965</title><link>https://osmondvanhemert.nl/posts/220331-spring4shell-cve-2022-22965/</link><pubDate>Thu, 31 Mar 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220331-spring4shell-cve-2022-22965/</guid><description>A critical RCE vulnerability in Spring Framework has the internet in panic mode, but the actual risk profile is more nuanced than the Log4Shell comparisons suggest.</description></item><item><title>Lapsus$ Breaches Okta and Microsoft — The Identity Provider Nightmare</title><link>https://osmondvanhemert.nl/posts/220324-lapsus-group-okta-microsoft-breach/</link><pubDate>Thu, 24 Mar 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220324-lapsus-group-okta-microsoft-breach/</guid><description>The Lapsus$ hacking group has breached both Okta and Microsoft, exposing critical weaknesses in identity provider security and third-party access management.</description></item><item><title>The node-ipc Protestware Incident — When Open Source Becomes a Weapon</title><link>https://osmondvanhemert.nl/posts/220317-node-ipc-protestware-supply-chain/</link><pubDate>Thu, 17 Mar 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220317-node-ipc-protestware-supply-chain/</guid><description>A popular npm package was deliberately sabotaged by its own maintainer, raising urgent questions about supply chain trust in open source.</description></item><item><title>HermeticWiper and the New Reality of Cyber Warfare</title><link>https://osmondvanhemert.nl/posts/220224-hermeticwiper-ukraine-cyber-warfare/</link><pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220224-hermeticwiper-ukraine-cyber-warfare/</guid><description>As conflict erupts in Ukraine, destructive wiper malware targeting critical infrastructure signals a new chapter in state-sponsored cyber operations.</description></item><item><title>Alpha-Omega Project — The Linux Foundation Gets Serious About Open Source Security</title><link>https://osmondvanhemert.nl/posts/220217-alpha-omega-open-source-security/</link><pubDate>Thu, 17 Feb 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220217-alpha-omega-open-source-security/</guid><description>The Linux Foundation&amp;rsquo;s new Alpha-Omega Project, backed by Google and Microsoft, aims to systematically improve the security of critical open source software.</description></item><item><title>The White House Open Source Summit — When Log4j Gets Political</title><link>https://osmondvanhemert.nl/posts/220113-white-house-open-source-security-summit/</link><pubDate>Thu, 13 Jan 2022 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/220113-white-house-open-source-security-summit/</guid><description>The White House convened tech leaders to address open source security after Log4Shell. Here&amp;rsquo;s what was discussed and what it means for developers.</description></item><item><title>After Log4Shell — Software Supply Chain Security Can't Wait</title><link>https://osmondvanhemert.nl/posts/211216-software-supply-chain-security-after-log4j/</link><pubDate>Thu, 16 Dec 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/211216-software-supply-chain-security-after-log4j/</guid><description>A week after Log4Shell, the patching chaos continues. But the bigger lesson is about software supply chain security and why we need SBOMs now.</description></item><item><title>Log4Shell — The Zero-Day That Broke the Internet's Weekend</title><link>https://osmondvanhemert.nl/posts/211209-log4shell-zero-day/</link><pubDate>Thu, 09 Dec 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/211209-log4shell-zero-day/</guid><description>A critical remote code execution vulnerability in Apache Log4j has sent the entire industry scrambling. Here&amp;rsquo;s what you need to know and do right now.</description></item><item><title>npm Supply Chain Under Siege — The coa and rc Package Compromises</title><link>https://osmondvanhemert.nl/posts/211111-npm-coa-rc-supply-chain-attacks/</link><pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/211111-npm-coa-rc-supply-chain-attacks/</guid><description>Popular npm packages coa and rc were hijacked to distribute malware, impacting thousands of projects and raising urgent questions about supply chain security.</description></item><item><title>ua-parser-js Compromised — Supply Chain Attacks Hit npm Again</title><link>https://osmondvanhemert.nl/posts/211021-ua-parser-js-npm-supply-chain-attack/</link><pubDate>Thu, 21 Oct 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/211021-ua-parser-js-npm-supply-chain-attack/</guid><description>The popular ua-parser-js npm package was hijacked to deliver cryptominers and credential stealers, affecting millions of weekly downloads.</description></item><item><title>OWASP Top 10 2021 — The Security Landscape Has Shifted</title><link>https://osmondvanhemert.nl/posts/210923-owasp-top-10-2021-update/</link><pubDate>Thu, 23 Sep 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210923-owasp-top-10-2021-update/</guid><description>The OWASP Top 10 gets its first update since 2017, and the changes reflect how fundamentally our attack surface has evolved.</description></item><item><title>OMIGOD — When Your Cloud Provider Installs Vulnerable Agents Without Telling You</title><link>https://osmondvanhemert.nl/posts/210916-azure-omigod-vulnerability-cloud-agents/</link><pubDate>Thu, 16 Sep 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210916-azure-omigod-vulnerability-cloud-agents/</guid><description>The OMIGOD vulnerabilities in Azure&amp;rsquo;s silently-installed OMI agent expose a troubling pattern: cloud providers deploying software on your VMs without your knowledge or consent.</description></item><item><title>Confluence Under Siege — CVE-2021-26084 and the Self-Hosted Software Problem</title><link>https://osmondvanhemert.nl/posts/210902-confluence-rce-cve-2021-26084/</link><pubDate>Thu, 02 Sep 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210902-confluence-rce-cve-2021-26084/</guid><description>The critical Confluence Server RCE vulnerability is being actively exploited in the wild, raising urgent questions about the sustainability of self-hosted enterprise software.</description></item><item><title>T-Mobile's Massive Data Breach — A Wake-Up Call for API Security</title><link>https://osmondvanhemert.nl/posts/210819-tmobile-data-breach-api-security/</link><pubDate>Thu, 19 Aug 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210819-tmobile-data-breach-api-security/</guid><description>The T-Mobile breach exposing 40+ million records highlights systemic failures in API security and data protection that the entire industry needs to address.</description></item><item><title>Pegasus Spyware — Zero-Click Exploits and What They Mean for Software Security</title><link>https://osmondvanhemert.nl/posts/210715-pegasus-spyware-zero-click-exploits/</link><pubDate>Thu, 15 Jul 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210715-pegasus-spyware-zero-click-exploits/</guid><description>The Pegasus Project revelations expose industrial-grade zero-click exploits targeting journalists and activists — and raise uncomfortable questions about software supply chains.</description></item><item><title>Kaseya VSA Attack — Supply Chain Ransomware Goes Nuclear</title><link>https://osmondvanhemert.nl/posts/210708-kaseya-vsa-supply-chain-ransomware/</link><pubDate>Thu, 08 Jul 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210708-kaseya-vsa-supply-chain-ransomware/</guid><description>The REvil ransomware group exploited Kaseya&amp;rsquo;s VSA platform to hit over 1,500 businesses simultaneously. This is what supply chain attacks look like at scale.</description></item><item><title>Colonial Pipeline Ransomware — When Cybersecurity Meets Critical Infrastructure</title><link>https://osmondvanhemert.nl/posts/210506-colonial-pipeline-ransomware/</link><pubDate>Thu, 06 May 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210506-colonial-pipeline-ransomware/</guid><description>The Colonial Pipeline ransomware attack exposes how deeply intertwined our digital infrastructure has become with physical systems we take for granted.</description></item><item><title>The Codecov Breach — When Your CI Pipeline Becomes the Attack Vector</title><link>https://osmondvanhemert.nl/posts/210415-codecov-supply-chain-attack/</link><pubDate>Thu, 15 Apr 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210415-codecov-supply-chain-attack/</guid><description>Codecov&amp;rsquo;s compromised Bash Uploader script exposed CI/CD secrets for thousands of organizations, highlighting a systemic weakness in how we trust third-party tools in our build pipelines.</description></item><item><title>PHP's Git Server Breach — A Supply Chain Wake-Up Call for Open Source</title><link>https://osmondvanhemert.nl/posts/210401-php-git-server-compromise/</link><pubDate>Thu, 01 Apr 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210401-php-git-server-compromise/</guid><description>Attackers pushed malicious commits to PHP&amp;rsquo;s official Git repository, exposing the fragile trust model behind open-source supply chains.</description></item><item><title>Hafnium and the Microsoft Exchange Zero-Days — A Supply Chain Nightmare Unfolds</title><link>https://osmondvanhemert.nl/posts/210304-microsoft-exchange-hafnium-zero-day/</link><pubDate>Thu, 04 Mar 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210304-microsoft-exchange-hafnium-zero-day/</guid><description>Four zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited at scale, and the fallout is only beginning.</description></item><item><title>Python 3.9.2 and 3.8.8 — Security Patches and the Maturing Python Ecosystem</title><link>https://osmondvanhemert.nl/posts/210225-python-392-security-release/</link><pubDate>Thu, 25 Feb 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210225-python-392-security-release/</guid><description>Python&amp;rsquo;s latest security releases fix critical vulnerabilities and highlight the increasingly professional security posture of the Python ecosystem.</description></item><item><title>SolarWinds Three Months Later — Rethinking Software Supply Chain Security</title><link>https://osmondvanhemert.nl/posts/210211-solarwinds-supply-chain-security/</link><pubDate>Thu, 11 Feb 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210211-solarwinds-supply-chain-security/</guid><description>Three months after the SolarWinds breach disclosure, the full scope is still unfolding and the implications for software supply chain security demand fundamental changes in how we build and deploy software.</description></item><item><title>Signal's Explosive Growth — What WhatsApp's Privacy Blunder Means for Messaging</title><link>https://osmondvanhemert.nl/posts/210121-signal-surge-whatsapp-privacy/</link><pubDate>Thu, 21 Jan 2021 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/210121-signal-surge-whatsapp-privacy/</guid><description>WhatsApp&amp;rsquo;s updated privacy policy drives millions to Signal, highlighting the growing demand for privacy-respecting open-source alternatives.</description></item><item><title>SolarWinds Hack — Why Supply Chain Attacks Should Terrify Every Developer</title><link>https://osmondvanhemert.nl/posts/201217-solarwinds-supply-chain-attack/</link><pubDate>Thu, 17 Dec 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/201217-solarwinds-supply-chain-attack/</guid><description>The SolarWinds supply chain attack is a watershed moment for software security — and it has profound implications for how we build, ship, and trust code.</description></item><item><title>FireEye Breach — When the Red Team Gets Red-Teamed</title><link>https://osmondvanhemert.nl/posts/201210-fireeye-breach-red-team-tools/</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/201210-fireeye-breach-red-team-tools/</guid><description>FireEye discloses that sophisticated attackers stole their red team tools. The implications for the security industry — and every organization using those tools — are serious.</description></item><item><title>NSA and CISA Sound the Alarm on Known Vulnerabilities — And We Should Listen</title><link>https://osmondvanhemert.nl/posts/201022-nsa-cisa-china-advisory/</link><pubDate>Thu, 22 Oct 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/201022-nsa-cisa-china-advisory/</guid><description>A joint NSA/CISA advisory details 25 CVEs actively exploited by Chinese state-sponsored actors. The uncomfortable truth: most are well-known and patchable.</description></item><item><title>Zerologon — The 10-Out-of-10 Vulnerability That Should Terrify You</title><link>https://osmondvanhemert.nl/posts/200910-zerologon-cve-2020-1472/</link><pubDate>Thu, 10 Sep 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200910-zerologon-cve-2020-1472/</guid><description>CVE-2020-1472, dubbed Zerologon, scores a perfect 10.0 CVSS and allows full domain takeover with a handful of packets. Here&amp;rsquo;s what you need to know.</description></item><item><title>The Twitter Bitcoin Hack — A Social Engineering Masterclass</title><link>https://osmondvanhemert.nl/posts/200716-twitter-bitcoin-hack-social-engineering/</link><pubDate>Thu, 16 Jul 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200716-twitter-bitcoin-hack-social-engineering/</guid><description>The massive Twitter compromise that hit Barack Obama, Elon Musk, and Apple wasn&amp;rsquo;t a sophisticated zero-day — it was social engineering targeting internal tools. That&amp;rsquo;s the scary part.</description></item><item><title>The Pandemic IoT Boom — More Devices, More Risk, Same Old Problems</title><link>https://osmondvanhemert.nl/posts/200618-iot-growth-pandemic-security/</link><pubDate>Thu, 18 Jun 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200618-iot-growth-pandemic-security/</guid><description>Home IoT device sales have surged during lockdowns, and every one of those devices just joined a corporate network via VPN. The security implications are significant.</description></item><item><title>Your CI/CD Pipeline Is Your New Attack Surface — And Remote Work Made It Worse</title><link>https://osmondvanhemert.nl/posts/200611-cicd-pipeline-security-remote-work/</link><pubDate>Thu, 11 Jun 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200611-cicd-pipeline-security-remote-work/</guid><description>As teams rushed to enable remote development workflows, CI/CD pipelines became a prime target. Here&amp;rsquo;s what&amp;rsquo;s going wrong and how to harden your build infrastructure.</description></item><item><title>Apple and Google's Exposure Notification API — Privacy Engineering at Scale</title><link>https://osmondvanhemert.nl/posts/200430-apple-google-exposure-notification-api/</link><pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200430-apple-google-exposure-notification-api/</guid><description>Apple and Google collaborate on a Bluetooth-based exposure notification system that puts privacy-preserving architecture front and center.</description></item><item><title>Zoom's Security Reckoning — When Rapid Growth Exposes Technical Debt</title><link>https://osmondvanhemert.nl/posts/200326-zoom-security-crisis/</link><pubDate>Thu, 26 Mar 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200326-zoom-security-crisis/</guid><description>Zoom&amp;rsquo;s explosive pandemic-driven growth is exposing serious security and privacy issues. The &amp;lsquo;Zoombombing&amp;rsquo; phenomenon is just the tip of the iceberg.</description></item><item><title>The Crypto AG Revelation — When Your Encryption Vendor Is the Intelligence Agency</title><link>https://osmondvanhemert.nl/posts/200213-cia-crypto-ag-backdoor/</link><pubDate>Thu, 13 Feb 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200213-cia-crypto-ag-backdoor/</guid><description>The Washington Post reveals the CIA secretly owned Crypto AG for decades, selling compromised encryption to governments worldwide. The supply chain trust implications are staggering.</description></item><item><title>The NSA Found a Critical Windows Crypto Bug — And That's Actually Good News</title><link>https://osmondvanhemert.nl/posts/200109-nsa-cve-2020-0601-windows-cryptoapi/</link><pubDate>Thu, 09 Jan 2020 00:00:00 +0000</pubDate><guid>https://osmondvanhemert.nl/posts/200109-nsa-cve-2020-0601-windows-cryptoapi/</guid><description>The NSA disclosed CVE-2020-0601, a critical vulnerability in Windows CryptoAPI&amp;rsquo;s certificate validation. The fact that they reported it instead of hoarding it marks a notable shift.</description></item></channel></rss>