Supply Chain Security

Most organisations depend on suppliers to deliver services, systems and products. You probably have several suppliers; it is how we do business.   Supply chains can be large and complex, involving many suppliers doing many different things. Effectively securing the supply chain can be hard because vulnerabilities can be inherent or introduced and exploited at any[…]

Hacker at a keyboard

VPN Applications Secretly Turning Android Phones into Proxies for Cyber Criminals

Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store.  The findings come from HUMAN’s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user’s device[…]