Jump to content

Supply chain attack: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
imported>Unknown user
No edit summary
(No difference)

Revision as of 02:53, 15 January 2026

Languages: English | Français

Supply chain attack

Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.


Source: CNSSI 4009-2015 | Category: