claim
Attackers are adopting a 'long-con' approach to the software supply chain, where they build a false reputation as good-faith actors over a long period rather than executing immediate point attacks.

Authors

Sources

Referenced by nodes (2)