<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Supply Chain Security on Osmond van Hemert</title><link>https://www.osmondvanhemert.nl/tags/supply-chain-security/</link><description>Recent content in Supply Chain Security on Osmond van Hemert</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© Osmond van Hemert. All rights reserved.</copyright><lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.osmondvanhemert.nl/tags/supply-chain-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Supply Chain Malware in PyTorch Lightning — When AI Infrastructure Becomes the Attack Surface</title><link>https://www.osmondvanhemert.nl/posts/260430-pytorch-lightning-supply-chain-malware/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/260430-pytorch-lightning-supply-chain-malware/</guid><description>A Dune-themed malware campaign targeting the PyTorch Lightning library highlights how AI/ML supply chains are becoming prime targets for sophisticated attacks.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/260430-pytorch-lightning-supply-chain-malware/featured.jpg"/></item><item><title>The xz Utils Aftermath — One Year Later, What Have We Actually Fixed?</title><link>https://www.osmondvanhemert.nl/posts/260409-xz-utils-supply-chain-anniversary/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/260409-xz-utils-supply-chain-anniversary/</guid><description>Nearly two years after the xz Utils backdoor shocked the open source world, the supply chain security landscape has changed — but not enough.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/260409-xz-utils-supply-chain-anniversary/featured.jpg"/></item><item><title>Software Supply Chain Security Gets Serious — SLSA and SBOM Adoption Accelerates</title><link>https://www.osmondvanhemert.nl/posts/260312-supply-chain-security-slsa-adoption/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/260312-supply-chain-security-slsa-adoption/</guid><description>Supply chain security frameworks like SLSA and SBOM requirements are moving from recommendations to mandates. Here&amp;rsquo;s what developers need to know about the shifting landscape.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/260312-supply-chain-security-slsa-adoption/featured.jpg"/></item><item><title>Ultralytics Supply Chain Attack — When Your Dependencies Bite Back</title><link>https://www.osmondvanhemert.nl/posts/251218-ultralytics-supply-chain-attack/</link><pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/251218-ultralytics-supply-chain-attack/</guid><description>A supply chain attack on the popular Ultralytics YOLO package highlights the persistent vulnerability of the Python ecosystem&amp;rsquo;s distribution pipeline.</description></item><item><title>NPM Supply Chain Attacks — The Problem That Won't Go Away</title><link>https://www.osmondvanhemert.nl/posts/250605-npm-supply-chain-security-lessons/</link><pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250605-npm-supply-chain-security-lessons/</guid><description>Another wave of malicious npm packages reminds us that JavaScript&amp;rsquo;s dependency ecosystem remains one of software&amp;rsquo;s biggest security challenges.</description></item><item><title>Tech Tariffs and the Software Supply Chain — What Engineers Need to Know</title><link>https://www.osmondvanhemert.nl/posts/250501-tech-tariffs-software-supply-chain/</link><pubDate>Thu, 01 May 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250501-tech-tariffs-software-supply-chain/</guid><description>New US tariffs on technology imports are sending ripples through hardware supply chains, cloud pricing, and software infrastructure planning.</description></item><item><title>The tj-actions Supply Chain Attack — Why Your CI/CD Pipeline Is an Attack Surface</title><link>https://www.osmondvanhemert.nl/posts/250313-github-actions-supply-chain-attack/</link><pubDate>Thu, 13 Mar 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250313-github-actions-supply-chain-attack/</guid><description>A compromised GitHub Action exposed secrets from thousands of repositories, highlighting how CI/CD pipelines have become prime targets for supply chain attacks.</description></item><item><title>The Polyfill.io Supply Chain Attack — A Wake-Up Call for CDN Trust</title><link>https://www.osmondvanhemert.nl/posts/240627-polyfill-io-supply-chain-attack/</link><pubDate>Thu, 27 Jun 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240627-polyfill-io-supply-chain-attack/</guid><description>The polyfill.io domain was acquired by a Chinese company and began injecting malware into over 100,000 websites, exposing fundamental weaknesses in how we trust third-party CDN dependencies.</description></item><item><title>The xz Utils Backdoor — Open Source's Worst Nightmare Almost Came True</title><link>https://www.osmondvanhemert.nl/posts/240328-xz-utils-backdoor-cve-2024-3094/</link><pubDate>Thu, 28 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240328-xz-utils-backdoor-cve-2024-3094/</guid><description>A sophisticated supply chain attack via the xz Utils compression library was caught just days before reaching stable Linux distributions.</description></item><item><title>MOVEit Transfer: The Supply Chain Breach That Keeps Growing</title><link>https://www.osmondvanhemert.nl/posts/230629-moveit-breach-supply-chain-security/</link><pubDate>Thu, 29 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230629-moveit-breach-supply-chain-security/</guid><description>The MOVEit Transfer vulnerability has now impacted hundreds of organizations worldwide — a stark reminder that managed file transfer tools remain critical and under-secured attack surfaces.</description></item><item><title>MOVEit Transfer Zero-Day — Another Supply Chain Nightmare Unfolds</title><link>https://www.osmondvanhemert.nl/posts/230601-moveit-zero-day-supply-chain-nightmare/</link><pubDate>Thu, 01 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230601-moveit-zero-day-supply-chain-nightmare/</guid><description>A critical zero-day in Progress MOVEit Transfer is being actively exploited, and the scope of the damage is still emerging.</description></item><item><title>One Year After Log4Shell — What Actually Changed?</title><link>https://www.osmondvanhemert.nl/posts/221215-log4shell-one-year-later/</link><pubDate>Thu, 15 Dec 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/221215-log4shell-one-year-later/</guid><description>A year after Log4Shell shook the software industry, we examine what&amp;rsquo;s improved in supply chain security — and what still keeps us up at night.</description></item><item><title>The node-ipc Protestware Incident — When Open Source Becomes a Weapon</title><link>https://www.osmondvanhemert.nl/posts/220317-node-ipc-protestware-supply-chain/</link><pubDate>Thu, 17 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220317-node-ipc-protestware-supply-chain/</guid><description>A popular npm package was deliberately sabotaged by its own maintainer, raising urgent questions about supply chain trust in open source.</description></item><item><title>The White House Open Source Summit — When Log4j Gets Political</title><link>https://www.osmondvanhemert.nl/posts/220113-white-house-open-source-security-summit/</link><pubDate>Thu, 13 Jan 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220113-white-house-open-source-security-summit/</guid><description>The White House convened tech leaders to address open source security after Log4Shell. Here&amp;rsquo;s what was discussed and what it means for developers.</description></item><item><title>After Log4Shell — Software Supply Chain Security Can't Wait</title><link>https://www.osmondvanhemert.nl/posts/211216-software-supply-chain-security-after-log4j/</link><pubDate>Thu, 16 Dec 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/211216-software-supply-chain-security-after-log4j/</guid><description>A week after Log4Shell, the patching chaos continues. But the bigger lesson is about software supply chain security and why we need SBOMs now.</description></item><item><title>Log4Shell — The Zero-Day That Broke the Internet's Weekend</title><link>https://www.osmondvanhemert.nl/posts/211209-log4shell-zero-day/</link><pubDate>Thu, 09 Dec 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/211209-log4shell-zero-day/</guid><description>A critical remote code execution vulnerability in Apache Log4j has sent the entire industry scrambling. Here&amp;rsquo;s what you need to know and do right now.</description></item><item><title>npm Supply Chain Under Siege — The coa and rc Package Compromises</title><link>https://www.osmondvanhemert.nl/posts/211111-npm-coa-rc-supply-chain-attacks/</link><pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/211111-npm-coa-rc-supply-chain-attacks/</guid><description>Popular npm packages coa and rc were hijacked to distribute malware, impacting thousands of projects and raising urgent questions about supply chain security.</description></item><item><title>ua-parser-js Compromised — Supply Chain Attacks Hit npm Again</title><link>https://www.osmondvanhemert.nl/posts/211021-ua-parser-js-npm-supply-chain-attack/</link><pubDate>Thu, 21 Oct 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/211021-ua-parser-js-npm-supply-chain-attack/</guid><description>The popular ua-parser-js npm package was hijacked to deliver cryptominers and credential stealers, affecting millions of weekly downloads.</description></item><item><title>Kaseya VSA Attack — Supply Chain Ransomware Goes Nuclear</title><link>https://www.osmondvanhemert.nl/posts/210708-kaseya-vsa-supply-chain-ransomware/</link><pubDate>Thu, 08 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210708-kaseya-vsa-supply-chain-ransomware/</guid><description>The REvil ransomware group exploited Kaseya&amp;rsquo;s VSA platform to hit over 1,500 businesses simultaneously. This is what supply chain attacks look like at scale.</description></item><item><title>The Codecov Breach — When Your CI Pipeline Becomes the Attack Vector</title><link>https://www.osmondvanhemert.nl/posts/210415-codecov-supply-chain-attack/</link><pubDate>Thu, 15 Apr 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210415-codecov-supply-chain-attack/</guid><description>Codecov&amp;rsquo;s compromised Bash Uploader script exposed CI/CD secrets for thousands of organizations, highlighting a systemic weakness in how we trust third-party tools in our build pipelines.</description></item><item><title>PHP's Git Server Breach — A Supply Chain Wake-Up Call for Open Source</title><link>https://www.osmondvanhemert.nl/posts/210401-php-git-server-compromise/</link><pubDate>Thu, 01 Apr 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210401-php-git-server-compromise/</guid><description>Attackers pushed malicious commits to PHP&amp;rsquo;s official Git repository, exposing the fragile trust model behind open-source supply chains.</description></item><item><title>Hafnium and the Microsoft Exchange Zero-Days — A Supply Chain Nightmare Unfolds</title><link>https://www.osmondvanhemert.nl/posts/210304-microsoft-exchange-hafnium-zero-day/</link><pubDate>Thu, 04 Mar 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210304-microsoft-exchange-hafnium-zero-day/</guid><description>Four zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited at scale, and the fallout is only beginning.</description></item><item><title>SolarWinds Three Months Later — Rethinking Software Supply Chain Security</title><link>https://www.osmondvanhemert.nl/posts/210211-solarwinds-supply-chain-security/</link><pubDate>Thu, 11 Feb 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210211-solarwinds-supply-chain-security/</guid><description>Three months after the SolarWinds breach disclosure, the full scope is still unfolding and the implications for software supply chain security demand fundamental changes in how we build and deploy software.</description></item><item><title>SolarWinds Hack — Why Supply Chain Attacks Should Terrify Every Developer</title><link>https://www.osmondvanhemert.nl/posts/201217-solarwinds-supply-chain-attack/</link><pubDate>Thu, 17 Dec 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/201217-solarwinds-supply-chain-attack/</guid><description>The SolarWinds supply chain attack is a watershed moment for software security — and it has profound implications for how we build, ship, and trust code.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/201217-solarwinds-supply-chain-attack/featured.jpg"/></item></channel></rss>