An attack that targets an organization by compromising a trusted third-party vendor, supplier, or software component in its supply chain. Attackers exploit the trust relationship to distribute malware or gain access to downstream targets.
Related Terms
Malware
malwareMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruse...
Vulnerability
generalA weakness in a system, application, or process that can be exploited by a threat actor to gain unauthorized access or c...
Zero-Day
generalA previously unknown vulnerability that is exploited before the software vendor is aware of it or has released a patch....