Ukraine: Russian hackers infiltrating software supply chains

'IT managers must be careful,' say cyber defenders

clock • 2 min read
Ukraine: Russian hackers infiltrating software supply chains

Russian hacking groups are working for military intelligence and using advanced tactics to spot vulnerabilities in target systems, says Ukraine's security agency.

Russian cybercriminals have shifted the focus of their attacks on Ukraine, aiming to infiltrate software supply chains to gather intelligence for the Russian military invasion, rather than spreadin...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
UK and allies reveal methodology of Russian GRU threat actor Unit 29155

Threats and Risks

Group has targeted organisations including governments and critical infrastructure providers for espionage purposes

clock 06 September 2024 • 2 min read
Transport for London hit by cyber incident

Hacking

Services unaffected

clock 03 September 2024 • 1 min read
Researchers ID security risks in GenAI development platforms

Threats and Risks

Exposes sensitive company data

clock 29 August 2024 • 2 min read
Most read
01

Avis notifies customers of data breach

10 September 2024 • 3 min read
03

Apple says iPhone 16 can challenge high-end PCs

10 September 2024 • 4 min read
04

In the North Sea, data really is the new oil

10 September 2024 • 5 min read
05

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read