Back to the supply chain and software compromise
When a threat actor compromises the coding of software the problems can be widepread – the SolarWinds attack and subsequent distribution of the infected software through legitimate update channels is a classic example. (Ironic but the SolarWinds customers who avoided the attack, were those with a poor cyber security stance … Continue reading Back to the supply chain and software compromise
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed