If I Were a Nation-State Hacker Looking to Conduct Supply Chain Attacks

in #cybersecurity3 years ago

Cyber threats are racing to find and exploit the next big Supply-Chain hack. Compromises like that of SolarWinds represent a tectonic shift in the Cybersecurity world, where the compromise of a single software supplier can expose all their customers for victimization by attackers.

In today's video, I look at the situation from the attacker’s perspective and explore how they might approach finding more supply-chain attack opportunities. I will discuss the three likely paths they will take, from easiest to most difficult, and cover the top five targeted technology supplier categories.

The cybersecurity industry will be talking much more about supply-chain attacks in the coming months. Understanding the threats and narrowing down the ingress vectors can help organizations focus their security efforts to better prevent and detect such attacks.

If you like these cybersecurity videos, please click the Like button and Subscribe to the Cybersecurity Insights channel!

Sort:  

Evil Matthew!!! :)

Attackers are constantly improving their tools and finding new ways to exploit hacking. One of the most common methods for malware to penetrate victims' computers has been the use of exploits that ensure the rapid spread of the threat.

They also allow access to programs and further infect the user's device through a security vulnerability.

In recent years, the most active threats have been exploiting vulnerabilities in Java products, Adobe software, and the Windows operating system.

Coin Marketplace

STEEM 0.29
TRX 0.12
JST 0.033
BTC 62937.86
ETH 3092.40
USDT 1.00
SBD 3.87