<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Supply-Chain on Security Unlocked</title><link>https://securityunlocked.com/tags/supply-chain/</link><description>Recent content in Supply-Chain on Security Unlocked</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://securityunlocked.com/tags/supply-chain/index.xml" rel="self" type="application/rss+xml"/><item><title>Defenders Under Siege: How Adversaries Turned Security Tools Into Weapons This Week</title><link>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</guid><description>Three incidents this week reveal the same strategic pattern: attackers turning trusted defensive infrastructure into weapons. Microsoft Defender zero-days, the Trivy scanner compromise that breached the European Commission, and UNC6783&amp;rsquo;s live-chat social engineering all exploit a cognitive constant: defenders don&amp;rsquo;t question the tools they depend on.</description></item><item><title>Mythos Finds Zero-Days. npm Found Three More.</title><link>https://securityunlocked.com/briefs/mythos-finds-zero-days.-npm-found-three-more./</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/mythos-finds-zero-days.-npm-found-three-more./</guid><description>The same week Anthropic unveiled an AI that autonomously finds zero-days, its own CLI shipped a CVSS 9.8 command injection, exposed by a debugging artifact that had been sitting in an npm package since March 31.</description></item><item><title>Trust Is the Exploit</title><link>https://securityunlocked.com/briefs/trust-is-the-exploit/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/trust-is-the-exploit/</guid><description>From a six-month DPRK social engineering operation to mass exploitation of developer ecosystems, this week&amp;rsquo;s threat landscape reveals that the most reliable attack surface is the trust we extend by default.</description></item></channel></rss>