{"id":6086,"date":"2025-11-11T12:11:26","date_gmt":"2025-11-11T12:11:26","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/11\/cisos-expert-guide-to-ai-supply-chain-attacks\/"},"modified":"2025-11-11T12:11:26","modified_gmt":"2025-11-11T12:11:26","slug":"cisos-expert-guide-to-ai-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/11\/cisos-expert-guide-to-ai-supply-chain-attacks\/","title":{"rendered":"CISO&#8217;s Expert Guide To AI Supply Chain Attacks"},"content":{"rendered":"<p>\u200bAI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations.<br \/>\nDownload the full CISO\u2019s expert guide to AI Supply chain attacks here.\u00a0<br \/>\nTL;DR<\/p>\n<p>AI-enabled supply chain attacks are exploding in scale and sophistication &#8211; Malicious package uploads to open-source repositories jumped 156% in\u00a0AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations.<br \/>\nDownload the full CISO\u2019s expert guide to AI Supply chain attacks here.\u00a0<br \/>\nTL;DR<\/p>\n<p>AI-enabled supply chain attacks are exploding in scale and sophistication &#8211; Malicious package uploads to open-source repositories jumped 156% in\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO\u2019s expert guide to AI Supply chain attacks here.\u00a0 TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication &#8211; Malicious package uploads to open-source repositories jumped&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/11\/cisos-expert-guide-to-ai-supply-chain-attacks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">CISO&#8217;s Expert Guide To AI Supply Chain Attacks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6086"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6086"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6086\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6087"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}