In Order To Spread Malware, Cyber Criminal Might Use Software Repositories Or Download Locations

As recently exposed by Cisco Talos, software supply chain attacks have gained popularity amongst all kinds of cyber criminals. Once exclusively used by cyberespionage threat actors, these attacks have now also become attractive for any kind of cybercriminal, who sees in this threat a way to compromise hundreds or thousands

Read More