claim
Attackers have shifted their focus from directly targeting organizations to exploiting vulnerabilities within the broader software supply chain and its downstream consumers.
Authors
Sources
- State of the Software Supply Chain Report | 10 Year Look - Sonatype www.sonatype.com via serper
Referenced by nodes (1)
- software supply chain concept