In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service
Source : Supply chain attacks: Mitigation and protection – Help Net Security
In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service
Source : Supply chain attacks: Mitigation and protection – Help Net Security