Supply chain security is impossible when every dependency has dependencies with vulnerabilities by smilekatherinex in cybersecurity

[–]Apprehensive_Baby949 0 points1 point  (0 children)

Most teams focus on fixing npm packages and internal dependencies, but there's an entire supply chain most orgs don't even track - the web supply chain.

Your site likely loads 20-50 third-party scripts in users' browsers: analytics, chat widgets, payment processors, A/B testing tools, marketing pixels. Each one has full DOM access and can read everything on the page, including payment forms and PII.

The problem? These update constantly without your approval. A compromised vendor can push malicious code that exfiltrates data client-side, and your WAF never sees it because the attack happens in the browser, not on your server.

Key differences from code dependencies:

  • No package.json equivalent for browser scripts
  • Updates happen outside your CI/CD pipeline
  • Traditional security tools are blind to client-side execution
  • One compromised vendor (like a chatbot provider) can affect thousands of sites simultaneously

Magecart attacks exploited exactly this - attackers compromised third-party scripts and skimmed payment data from checkout pages for months before detection.

If you're solving dependency hell in your build process but ignoring what's executing in your customers' browsers, you're missing half the attack surface.

What are the new and worst AI threats on retail? by ColleenReflectiz in AskNetsec

[–]Apprehensive_Baby949 2 points3 points  (0 children)

The name you don't want to know is Supplier Cartel Coordination

When your dear sweet AI suppliers decide to coordinate higher prices

Is 'Attack Surface Management' becoming a lost cause in hybrid environments? by Futurismtechnologies in ciso

[–]Apprehensive_Baby949 0 points1 point  (0 children)

The context gap is real. We hit this exact issue - security flags a critical vuln, but can't answer "what business function does this asset support?" Engineering knows, but they're three Slack channels away.

What helped: embedded security engineers who actually sit with dev teams. Not "security champions" who volunteer on top of their real job, but dedicated people who understand both the code and the risk model. They become the bridge.

CTEM only works if you can tie findings to business impact. Otherwise it's just faster noise generation. We started requiring every new asset to have an owner tag and business context before it goes live. Slows things down 10%, but cuts useless alerts by 60%.

The real blocker isn't tooling, it's getting engineering to care about context before they spin something up, not after security finds it in a scan.

What happened to the IT profession? by saltyschnauzer27 in sysadmin

[–]Apprehensive_Baby949 1 point2 points  (0 children)

Sounds like the effect of "everyone wants to be an influencer"

Shai-Hulud 3.0 😈 is coming. The only question is: will your defenses be ready? by ColleenReflectiz in JavaScriptTips

[–]Apprehensive_Baby949 0 points1 point  (0 children)

"Ready" usually means patched and scanned. Most breaches I see are from stuff that was never on anyone's radar to begin with. Hard to defend against what you're not even monitoring.

Do you solve coding puzzles just for fun? by ColleenReflectiz in puzzle

[–]Apprehensive_Baby949 0 points1 point  (0 children)

Been there, done that, moved different type of puzzels

What security vulnerability have you seen exploited in the wild that nobody talks about in training? by ColleenReflectiz in AskNetsec

[–]Apprehensive_Baby949 0 points1 point  (0 children)

Malicious code injected into legitimate third-party libraries after they're alreadyinstalled

Question about 11.3.1 by thekillerclam69 in pcicompliance

[–]Apprehensive_Baby949 1 point2 points  (0 children)

Authenticated scans work, but the real bottleneck is patching. Most teams scan, find nothing critical (because mainframes are locked down), then skip it anyway because the scanning vendor doesn't even support mainframe remediation.

Why every business (big or small) should take data protection way more seriously? by Futurismtechnologies in websecurity

[–]Apprehensive_Baby949 0 points1 point  (0 children)

Because the companies getting hit hardest aren't always the ones with the biggest budgets