A critical flaw in n8n, an open-source workflow automation tool, has been exploited by attackers, highlighting the growing threat of supply-chain attacks. Meanwhile, the Slopoly malware has been identified as a new strain of malware targeting users. Interpol has also launched a crackdown on cybercrime, signaling a heightened focus on global law enforcement efforts to combat online threats. Vulnerabilities in Linux AppArmor have been discovered, allowing attackers to gain root privileges, and a US defense contractor has been linked to the development of Coruna exploits. A data breach at Telus Digital has also been reported, underscoring the evolving nature of cyber attacks1. The exploitation of these vulnerabilities and the emergence of new malware strains demonstrate the need for organizations to stay vigilant and proactive in their cybersecurity efforts. This matters to practitioners because the evolving attack methods and supply-chain vulnerabilities can have significant downstream regulatory and supply-chain effects.