Software that automatically updates itself presents an attack surface, which can be leveraged en masse through the compromise of the vendor's infrastructure. This has been seen multiple times during 2017, with high profile examples includingNotPetya and CCleaner. Most large organisations have built robust perimeter defences for incoming and outgoing traffic, but this threat vector … Continue reading Automated Hunting of Software Update Supply Chain Attacks
The post “Automated Hunting of Software Update Supply Chain Attacks” appeared first on Security Boulevard.
from “Automated Hunting of Software Update Supply Chain Attacks”
No comments:
Post a Comment