claim
Supply chain attacks, where attackers compromise trusted vendors, software providers, or open-source components, allow attackers to infiltrate multiple organizations simultaneously.

Authors

Sources

Referenced by nodes (1)