Overview
A cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
More in Cybersecurity
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Next-Generation Firewall
Defensive SecurityAn advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
Data Loss Prevention
Data ProtectionTechnology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
Software Bill of Materials
Offensive SecurityA comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.
Intrusion Detection System
Defensive SecurityA system that monitors network traffic or system activities for malicious activity or policy violations.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.