Skip to content
unJaena Weekly 存档
unJaena Weekly · 发布于 2026年4月14日

Supply-chain breaches dominate the week

u
unJaena editorial team

Supply-chain breaches dominate the week

Three major stories this week all point at the same failure mode: trusted build pipelines being used as delivery vectors for attacker code. If you run forensic triage on CI/CD artifacts only after the fact, this is the issue to read end-to-end.

Why it matters

  • Attackers are shifting from endpoint malware to build-system tampering
  • SBOM hygiene + dependency pinning are now first-order IR controls
  • DFIR tools are catching up but the visibility gap is still wide

We picked the five links below because each one teaches a different piece of the defense story — tooling, detection, response, and post-incident review.

14 · SANS ISC Diary

Number usage in passwords: take two

Follow-up analysis on how users place numbers within passwords, with implications for cracking-rule prioritization in IR.

Useful when investigators need to justify rule choices in hashcat — short tip-style mention.

passwordsresearchir-tips
SANS ISC Diary
23 · SANS ISC Diary

ISC Stormcast podcast — week roundup

Daily Stormcast podcast continues to summarize active threats and CVEs; this week emphasizes web-shell scanning trends.

Link the most recent episode only — repeating four daily entries adds no value.

podcastdailythreat-summary
SANS ISC Diary

博客更多内容

由 AI 策划、unJaena 编辑团队审阅编辑的数字取证摘要 — 全部过刊集合。

博客更多内容

订阅双周摘要

订阅双周摘要

AI使用说明: This newsletter is AI-assisted. Source aggregation and draft summaries are generated by a large language model, then reviewed and edited by the unJaena editorial team before publication.