Attacking the Software Supply Chain 



Hackers are rational actors; they want to accomplish their goals using the least amount of effort possible. Attacking proprietary applications can be hard work. Hackers need to conduct research – ideally by obtaining a copy of the software – then attempt to find weaknesses they can exploit.  

After years of attacking networks and custom software, enterprising hackers found an easier attack vector and switched to attacking the application development process itself.  Even better, attackers need not break into an organization’s source repository.  Instead, they simply add their malicious code to common open source projects used by organizations and wait for the developers to add the code to proprietary applications themselves.



















By clicking 'Download Now' you agree to our Terms of Use. We take your privacy seriously. For more information please read our Privacy Policy. By registering with the Enterprise Guide you will automatically receive our weekly Product Update and Technology Insider eNewsletters.

Copyright 2021 Enterprise Guide. All Rights Reserved. Terms of Use | Privacy Policy