Security News > 2021 > July > Where does the SME fit into a supply chain attack?

Businesses have connections to other businesses, who supply them with goods, and whom they supply with goods - both parts and software.
In many cases, a company has its own supply chain while simultaneously being part of the supply chain for other, probably larger, businesses.
Every company has a duty to protect its customers from supply chain attacks while simultaneously taking action to prevent being a supply chain victim of its own suppliers.
The classic example of the possible scale of a software supply chain attack can be found in the 2020 SolarWinds hack in the U.S. Following an undetected breach at SolarWinds, attackers were able to surreptitiously add malware to its Orion software.
SMEs - like MEDoc and Inbenta - are frequently the target of supply chain attacks.
With supply chain attacks being a major growth area for cyber criminals, this is a worsening scenario, and the question is "What can the SME do to protect both itself and its customers?".
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/y2ayZRncoJQ/
Related news
- PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack (source)
- IPany VPN breached in supply-chain attack to push custom malware (source)
- Supply chain attack hits Chrome extensions, could expose millions (source)
- Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant' (source)
- North Korea targets crypto developers via NPM supply chain attack (source)
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)
- China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access (source)