Supply chain attacks: Mitigation and protection

5-2-5

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical cyber attacks, supply chain attacks provide two major advantages to attackers. Firstly, a single supply chain attack can target multiple companies at once (since multiple companies use the same code dependencies and third-party scripts); as such, the potential return of investment of the attack is higher.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*