Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & Chief Executive Officer at Quantum Infinite Solutions Group Ltd.
  • Residence:
    Dublin
  • County:
    Dublin
  • Country:
    Ireland
Big Data Services
Data Science Consulting
Data Analytics Consulting
  • Big Data
  • Machine Learning
  • Analytical Ai
  • Computer Vision

Tag: Supplychain

Researchers Uncover Rust Supply-Chain Attack Targeting Cloud CI Pipelines
May 20, 2022 / Security
Researchers Uncover Rust Supply-Chain Attack Targeting Cloud CI Pipelines

An instance of software program supply chain assault has actually been observed in the Corrosion shows language’s crate registry that…

Iranian Hackers Target Several Israeli Organizations With Supply-Chain Attacks
Iranian Hackers Target Several Israeli Organizations With Supply-Chain Attacks

IT and communication firms in Israel have been on the heart of a provide chain assault marketing campaign spearheaded by…

Kaseya supply‑chain attack: What we know so far
July 22, 2021 / Security
Kaseya supply‑chain attack: What we know so far

As information breaks concerning the supply-chain ransomware assault in opposition to Kaseya’s IT administration software program, right here’s what we…

CloudFlare CDNJS Bug Could Have Led to Widespread Supply-Chain Attacks
July 22, 2021 / Security
CloudFlare CDNJS Bug Could Have Led to Widespread Supply-Chain Attacks

Internet infrastructure and web site safety firm Cloudflare final month mounted a important vulnerability in its CDNJS library that is…

Rapid7 Source Code Breached in Codecov Supply-Chain Attack
May 14, 2021 / Security
Rapid7 Source Code Breached in Codecov Supply-Chain Attack

Cybersecurity firm Rapid7 on Thursday revealed that unidentified actors improperly managed to pay money for a small portion of its…

A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks
April 29, 2021 / Security
A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks

The maintainers of Composer, a package deal supervisor for PHP, have shipped an replace to handle a important vulnerability that…

1 2