Increasing dependence on third-party software and cloud-based services has heightened supply chain cyber-vulnerabilities. Regulations such as the EU’s DORA and NIS2 have focused on strengthening supply chain cybersecurity. Companies should adopt a risk-based approach, identify potential attack paths, and restrict access to resources. Emphasizing resilience over absolute prevention, they should prioritize defenses against greatest threats, segmenting their environment into secure zones and employing a zero-trust approach.
![](https://healsecurity.com/wp-content/uploads/2025/02/hackers20exploiting20ivanti20connect20secure20rce20vulnerability.webp.jpeg)
Hackers Exploiting Ivanti Connect Secure RCE Vulnerability to Install SPAWNCHIMERA Malware
A severe vulnerability in Ivanti Connect Secure has been exploited by multiple threat actors to deploy an advanced malware variant, SPAWNCHIMERA. The malware includes key