Jump to content
  • Sign Up
×
×
  • Create New...

Software supply chains are coming under attack more than ever


Recommended Posts

  • Diamond Member

This is the hidden content, please

Software supply chains are coming under ******* more than ever

data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///ywAAAAAAQABAAACAUwAOw==

Cyberattacks against software supply chains have gotten so widespread that at least one of them happens every two days, a

This is the hidden content, please
from Cyble has claimed.

Software supply chain ******* happens when a threat actor compromises a software development company, or a platform, that another company uses in its products and services. As a result, that other company ends up being compromised as well, and most of the time, hackers end up stealing business and customer data, or ********** company source code.

As per the report, in the six-month ******* between February and August 2024, there were at least 90 successful supply chain attacks, with the report also citing “claims of successful supply chain attacks” on the dark web.

US firms in the crosshairs

Most of the attacks targeted IT providers, the researchers further explained, adding that it was unsurprising given these companies’ reach. A third of the total (30 attacks) targeted IT providers, followed by technology product companies with 14 attacks. Aerospace & defense (9 breaches), manufacturing (9 breaches), and healthcare (8 breaches) were the next most frequent victims of supply chain attacks.

IT providers might be the biggest target, but very few industries are actually spared. Cyble says that of the 25 verticals it tracked, 22 suffered at least one supply chain ******* this year.

Geographically, companies located in the ******* States suffered the most (31 attacks), followed by those in the *** (10). Germany and Australia were next with five each, while Japan and India had four.

Cyble says that the most effective place to control software supply chain risks is in the continuous integration and development (CI/CD) process.

“Carefully vetting your partners and suppliers and requiring good security controls in contracts are ways to improve third-party security,” the researchers concluded.

More from TechRadar Pro



This is the hidden content, please

#Software #supply #chains #coming #*******

This is the hidden content, please

This is the hidden content, please

For verified travel tips and real support, visit: https://hopzone.eu/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.