<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Supply Chain Security on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/tags/supply-chain-security/</link><description>Recent content in Supply Chain Security on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 26 Feb 2025 11:27:46 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/tags/supply-chain-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Preventing Crypto Exchange Hacks: Lessons from Bybit Heist</title><link>https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/</link><pubDate>Wed, 26 Feb 2025 11:27:46 +0000</pubDate><guid>https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/</guid><description>&lt;p&gt;Bybit, a cryptocurrency exchange, &lt;a href="https://announcements.bybit.com/article/incident-update---eth-cold-wallet-incident-blt292c0454d26e9140/"&gt;recently suffered one of the largest crypto thefts in history&lt;/a&gt;, with attackers making off with $1.4 billion. The attack, attributed to North Korean cybercriminals, exploited vulnerabilities in Bybit’s security processes, leveraging malware and social engineering to bypass multi-signature protections. This blog post breaks down how the attack occurred, the techniques used by the attackers, and lessons for the crypto industry.&lt;/p&gt;</description></item><item><title>Why Is Software Supply Chain Security Important?</title><link>https://bsg.tech/blog/why-is-it-supply-chain-security-so-important/</link><pubDate>Tue, 02 Nov 2021 20:47:26 +0000</pubDate><guid>https://bsg.tech/blog/why-is-it-supply-chain-security-so-important/</guid><description>&lt;p&gt;Supply chain cyber security is so hot right now. According to the &lt;a href="https://www.enisa.europa.eu/news/enisa-news/hackers-for-hire-drive-the-evolution-of-the-new-enisa-threat-landscape"&gt;ENISA Threat Landscape&lt;/a&gt; 2021 report, software supply chain attacks are at #9 of the most common cyberattack vectors. CISA and NIST have issued guidance on &lt;a href="https://www.cisa.gov/publication/software-supply-chain-attacks"&gt;Defending Against Software Supply Chain Attacks&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>