Friday, November 12, 2021

What is a Supply Chain Attack?

What is a Supply Chain Attack?

Supply Chain Attacks Explained – What is a Supply Chain Attack? How do Supply Chain Attacks Work? | What you need to know about Supply Chain AttacksIn this e...

Click Here:- https://www.youtube.com/watch?v=6HLOknSWxxc

In this episode we are going to talk about Supply Chain Attacks.  Whether you talk about Solarwinds, Codecov, Ccleaner or the Ukrainian accounting software MEDoc, Supply Chain attacks are on the rise.  Supply chain attacks are scary because they're really hard to deal with, and because they make it clear you're trusting every vendor whose code is on your machine, and you're trusting every vendor's vendor.  Believe it or not supply chain attacks were first demonstrated around four decades ago, when Ken Thompson, one of the creators of the Unix operating system, wanted to see if he could hide a backdoor in Unix's login function.

The goal of this video is to help you understand What supply chain attack means along with the different types that exist.

This way you can 

A) Have a reference to check your own systems and processes to see whether or not your current plan and working mode has any vulnerabilities to these types of attacks 

B) So that you can read about these attacks and be able to spot the type yourself 

What is a Supply Chain Attack?  Supply Chain Attacks.  How Supply Chain Attacks work

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. Cybercriminals typically tamper with the manufacturing process of a product by installing a rootkit or hardware-based spying components. 


No comments:

Post a Comment

Supply Chain attacks, Espionage, & Russian Hackers. Nobellium targets Tech Resellers in Cyberattacks - YouTube

Supply chain attacks 2021  -  SolarWinds APT Targets Tech Resellers in Latest Supply-Chain CyberattacksOriginal article: https://threatpost....