A cyberattack in which an adversary compromises a trusted software or hardware supplier to inject malicious code or vulnerabilities into the final product before it reaches end users.

Terms of Service
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram