Software Supply Chain Security: The Basics and Four Critical Best Practices
...attack occurs when a threat actor “infiltrates a software vendor’s network and employs malicious code to compromise the software before the vendor sends it to their customers. The compromised software...