Exposing Infection Techniques Across Supply Chains and Codebases

05-Oct-23

Threat actors’ strategies against their victims evolve as technology advances and the globe gets more interconnected. By consistently exploiting the deep interdependencies inside supply chains and codebases, threat actors offer a substantial risk to enterprises, individuals, and communities.

One of the most worrying recent trends in the cybersecurity landscape is the rise of supply chain assaults — particularly those that corrupt codebases — as a serious worldwide problem. According to the European Union Agency for Cybersecurity ENSA), 39% to 62% of firms were affected by a third-party cyber incident, with only 40% of surveyed organizations claiming to understand their third-party cyber and privacy threats.

Read More…