supply chain attack
-
Pretty Much All Computer Code Can Be Hijacked by Newly Discovered ‘Trojan Source’ Exploit
A new study shows that pretty much all of the world’s computer code is vulnerable to a sneaky kind of exploit, the likes of which could (in the worst-case scenario) result in large-scale supply chain attacks.
-
Hackers Snuck Backdoors Into ASUS Software Updates, Infecting Thousands
On Monday, we saw once again how criminals can exploit trust and use it as a weakness.