When one major breach technique becomes successful, it’s a sure bet that rapid adoption by threat actors will follow.
This maxim has become more evident following a successful attack on the software supply chain through a breach of SolarWinds Inc. more than one year ago. Software…
Source: siliconangle.com – Read more