Skip to content
unJaena Weekly Archive
unJaena Weekly · Published April 14, 2026

Supply-chain breaches dominate the week

u
unJaena editorial team

Supply-chain breaches dominate the week

Three major stories this week all point at the same failure mode: trusted build pipelines being used as delivery vectors for attacker code. If you run forensic triage on CI/CD artifacts only after the fact, this is the issue to read end-to-end.

Why it matters

  • Attackers are shifting from endpoint malware to build-system tampering
  • SBOM hygiene + dependency pinning are now first-order IR controls
  • DFIR tools are catching up but the visibility gap is still wide

We picked the five links below because each one teaches a different piece of the defense story — tooling, detection, response, and post-incident review.

14 · SANS ISC Diary

Number usage in passwords: take two

Follow-up analysis on how users place numbers within passwords, with implications for cracking-rule prioritization in IR.

Useful when investigators need to justify rule choices in hashcat — short tip-style mention.

passwordsresearchir-tips
SANS ISC Diary
23 · SANS ISC Diary

ISC Stormcast podcast — week roundup

Daily Stormcast podcast continues to summarize active threats and CVEs; this week emphasizes web-shell scanning trends.

Link the most recent episode only — repeating four daily entries adds no value.

podcastdailythreat-summary
SANS ISC Diary

More from the blog

Every issue of unJaena Weekly — AI-curated, human-edited digital forensics digest, published by the unJaena editorial team.

More from the blog

Subscribe to the biweekly digest

Subscribe to the biweekly digest

AI use disclosure: This newsletter is AI-assisted. Source aggregation and draft summaries are generated by a large language model, then reviewed and edited by the unJaena editorial team before publication.