CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review
Common Information
Type | Value |
---|---|
UUID | 1161bfcb-8e9f-4a1e-81b8-de9ed709d489 |
Fingerprint | 6535a1dceb7dacc698c40d66f0bb52f940ff6f927310e5c608f8c8c9cb66b7bc |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Jan. 20, 2023, 11:45 a.m. |
Added to db | May 24, 2024, 5:04 p.m. |
Last updated | Aug. 31, 2024, 8:49 a.m. |
Headline | CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review |
Title | CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review |
Detected Hints/Tags/Attributes | 455/4/454 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | css.ethz.ch |
|
Details | Domain | 2 | seclab.cs.ucdavis.edu |
|
Details | Domain | 7 | danielmiessler.com |
|
Details | Domain | 34 | www.enisa.europa.eu |
|
Details | Domain | 82 | csrc.nist.gov |
|
Details | Domain | 469 | www.cisa.gov |
|
Details | Domain | 25 | link.springer.com |
|
Details | Domain | 2 | tre.org |
|
Details | Domain | 1 | council.org |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 1 | unidir.org |
|
Details | Domain | 154 | arxiv.org |
|
Details | Domain | 1 | ritylab.disi.unitn.it |
|
Details | Domain | 177 | www.wired.com |
|
Details | Domain | 1 | www.newsd.admin.ch |
|
Details | Domain | 111 | www.justice.gov |
|
Details | Domain | 15 | www.wired.co.uk |
|
Details | Domain | 1 | mantec-enterprise-blogs.security.com |
|
Details | Domain | 9 | blog.sonatype.com |
|
Details | Domain | 262 | www.welivesecurity.com |
|
Details | Domain | 80 | www.eset.com |
|
Details | Domain | 1 | nica.com |
|
Details | Domain | 1 | tice.gov |
|
Details | Domain | 16 | justice.gov |
|
Details | Domain | 84 | www.forbes.com |
|
Details | Domain | 1 | tin.com |
|
Details | Domain | 35 | fireeye.com |
|
Details | Domain | 1 | www.christiandve.com |
|
Details | Domain | 2 | www.virsec.com |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 7 | www.mitre.org |
|
Details | Domain | 11 | carnegieendowment.org |
|
Details | Domain | 1 | pubs.nist.gov |
|
Details | Domain | 5 | capec.mitre.org |
|
Details | Domain | 138 | www.darkreading.com |
|
Details | Domain | 1 | www.trust |
|
Details | Domain | 1 | wave.com |
|
Details | Domain | 403 | securelist.com |
|
Details | Domain | 1 | gence.com |
|
Details | Domain | 10 | www.atlanticcouncil.org |
|
Details | Domain | 4 | point.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 8 | www.aha.org |
|
Details | Domain | 1 | usp.internet.byu.edu |
|
Details | Domain | 3 | incolumitas.com |
|
Details | Domain | 57 | www.theregister.com |
|
Details | Domain | 40 | ieeexplore.ieee.org |
|
Details | Domain | 1 | tion.com |
|
Details | Domain | 1 | bytes.com |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 1 | dium.com |
|
Details | Domain | 1 | dhiyaneshgeek.github.io |
|
Details | Domain | 8 | www.prnewswire.com |
|
Details | Domain | 38 | www.statista.com |
|
Details | Domain | 1 | puter.com |
|
Details | Domain | 1 | tyweek.com |
|
Details | Domain | 2 | www.twilio.com |
|
Details | Domain | 7 | www.cpomagazine.com |
|
Details | Domain | 6 | www.mimecast.com |
|
Details | Domain | 8 | www.csa.gov.sg |
|
Details | Domain | 1 | www.al |
|
Details | Domain | 1 | taro.com |
|
Details | Domain | 29 | www.techrepublic.com |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 1 | baesystemsai.blog |
|
Details | Domain | 1 | spot.com |
|
Details | Domain | 19 | www.pwc.co.uk |
|
Details | Domain | 1 | leusercontent.com |
|
Details | Domain | 10 | blogger.com |
|
Details | Domain | 1 | mai.com |
|
Details | Domain | 1 | processbolt.com |
|
Details | Domain | 4 | rity.com |
|
Details | Domain | 18 | blog.sucuri.net |
|
Details | Domain | 52 | blog.cloudflare.com |
|
Details | Domain | 1 | ernews.com |
|
Details | Domain | 13 | w3techs.com |
|
Details | Domain | 36 | decoded.avast.io |
|
Details | Domain | 280 | thehackernews.com |
|
Details | Domain | 1 | nity.broadcom.com |
|
Details | Domain | 13 | www.giac.org |
|
Details | Domain | 22 | security.googleblog.com |
|
Details | Domain | 89 | arstechnica.com |
|
Details | Domain | 122 | www.kaspersky.com |
|
Details | Domain | 3 | drweb.com |
|
Details | Domain | 21 | news.drweb.com |
|
Details | Domain | 4 | fcc.gov |
|
Details | Domain | 10 | www.fcc.gov |
|
Details | Domain | 81 | blog.malwarebytes.com |
|
Details | Domain | 124 | www.sentinelone.com |
|
Details | Domain | 78 | securityaffairs.co |
|
Details | Domain | 105 | web.archive.org |
|
Details | Domain | 1 | tis.com |
|
Details | Domain | 1 | web.ar |
|
Details | Domain | 1 | chive.org |
|
Details | Domain | 10 | www.radware.com |
|
Details | Domain | 261 | blog.talosintelligence.com |
|
Details | Domain | 1 | erge.com |
|
Details | Domain | 5 | www.lemonde.fr |
|
Details | Domain | 53 | blog.avast.com |
|
Details | Domain | 7 | www.synopsys.com |
|
Details | Domain | 1 | www.revenera.com |
|
Details | Domain | 2 | rum.org |
|
Details | Domain | 11 | www3.weforum.org |
|
Details | Domain | 1 | blog.npmjs.org |
|
Details | Domain | 6 | bsi.bund.de |
|
Details | Domain | 22 | www.bsi.bund.de |
|
Details | Domain | 1 | www-file.huawei.com |
|
Details | Domain | 1 | sans.com |
|
Details | Domain | 5 | www2.deloitte.com |
|
Details | Domain | 22 | www.sonatype.com |
|
Details | Domain | 2 | www.ncsc.govt.nz |
|
Details | Domain | 1 | obscuritylabs.com |
|
Details | Domain | 768 | www.youtube.com |
|
Details | Domain | 5 | docs.broadcom.com |
|
Details | Domain | 1 | ant.com |
|
Details | Domain | 172 | www.crowdstrike.com |
|
Details | Domain | 2 | www.business |
|
Details | Domain | 3 | wire.com |
|
Details | Domain | 1 | www.newsd.ad |
|
Details | Domain | 1 | min.ch |
|
Details | Domain | 1 | media.cert.eu |
|
Details | Domain | 3 | ropa.eu |
|
Details | Domain | 4 | docs.house.gov |
|
Details | Domain | 6 | www.voanews.com |
|
Details | Domain | 37 | www.cnbc.com |
|
Details | Domain | 1 | wyden.senate.gov |
|
Details | Domain | 1 | www.wyden.senate.gov |
|
Details | Domain | 1 | ate.gov |
|
Details | Domain | 123 | www.reuters.com |
|
Details | Domain | 1 | berg.com |
|
Details | Domain | 1 | www.secarma.com |
|
Details | Domain | 1 | www.tomorrowunlocked.com |
|
Details | Domain | 5 | times.com |
|
Details | Domain | 98 | www.ncsc.gov.uk |
|
Details | Domain | 133 | www.infosecurity-magazine.com |
|
Details | Domain | 1 | rityledger.com |
|
Details | Domain | 1 | bug.org |
|
Details | Domain | 216 | www.symantec.com |
|
Details | Domain | 1 | fence.com |
|
Details | Domain | 370 | www.proofpoint.com |
|
Details | Domain | 11 | post.com |
|
Details | Domain | 24 | duo.com |
|
Details | Domain | 1 | ters.com |
|
Details | Domain | 7 | www.baesystems.com |
|
Details | Domain | 151 | www.bbc.com |
|
Details | Domain | 2 | ian.com |
|
Details | Domain | 1 | www.thestar.com |
|
Details | Domain | 60 | www.gartner.com |
|
Details | Domain | 2 | ecsirt.net |
|
Details | Domain | 1 | sirt.net |
|
Details | Domain | 5 | irp.fas.org |
|
Details | Domain | 10 | www.jstor.org |
|
Details | Domain | 1 | pol.europa.eu |
|
Details | Domain | 1 | www.trusted-introducer.org |
|
Details | Domain | 1 | www.ecsirt.net |
|
Details | Domain | 256 | ec.europa.eu |
|
Details | Domain | 1 | tory.wodc.nl |
|
Details | Domain | 31 | dl.acm.org |
|
Details | Domain | 1 | www.igi-global.com |
|
Details | 1 | dium.com/@alex.birsan |
||
Details | File | 1 | ports.html |
|
Details | File | 6 | seclab.cs |
|
Details | File | 1 | karg74.pdf |
|
Details | File | 1 | force_year-two-report_508.pdf |
|
Details | File | 1 | ency-mitigations.pdf |
|
Details | File | 1 | rity%20in%20the%20cyber%20age.pdf |
|
Details | File | 4 | fetch.php |
|
Details | File | 1 | ccs2020poster.pdf |
|
Details | File | 1 | 67047.pdf |
|
Details | File | 1 | me.doc |
|
Details | File | 1 | ncsc_placemat.pdf |
|
Details | File | 13 | cyber-kill-chain.html |
|
Details | File | 1 | trends.pdf |
|
Details | File | 1 | nical_brief_2020.pdf |
|
Details | File | 1 | supply-chain-attack-framework-14-0228.pdf |
|
Details | File | 1 | 03466.pdf |
|
Details | File | 1 | ply-chain-cyber-resiliency-mitigations.pdf |
|
Details | File | 1 | tacks_508_1.pdf |
|
Details | File | 1 | 800-161r1-draft2.pdf |
|
Details | File | 1 | 683.html |
|
Details | File | 1 | munication-technology.pdf |
|
Details | File | 1 | 447.html |
|
Details | File | 1 | software-supply-chain-attacks-4-1-21.pptx |
|
Details | File | 1 | code-security-sp-2016.pdf |
|
Details | File | 1 | 00169.pdf |
|
Details | File | 1 | cess-market-leading-mobile-sdks-and-more-300688440.html |
|
Details | File | 252 | www.cs |
|
Details | File | 1 | nues.php |
|
Details | File | 3 | apt10-operation-cloud-hopper_3.html |
|
Details | File | 1 | pwc-uk-operation-cloud-hopper-report-april-2017.pdf |
|
Details | File | 1 | leusercontent.html |
|
Details | File | 1 | cloudflare-cdnjs-bug-could-have-led-to.html |
|
Details | File | 1 | lian-certificate-authority-hacked.html |
|
Details | File | 1 | lights-triada.html |
|
Details | File | 1 | clear-power-plant.html |
|
Details | File | 70 | e.doc |
|
Details | File | 6 | the-medoc-connection.html |
|
Details | File | 4 | avast-distributes-malware.html |
|
Details | File | 6 | colors.js |
|
Details | File | 3 | faker.js |
|
Details | File | 1 | la-piste-de-l-espionnage-economique-cible_5189878_4408996.html |
|
Details | File | 1 | open-source-security-risk-analysis.html |
|
Details | File | 2 | color.js |
|
Details | File | 1 | pr-18-0854-supply-chain-cyber-resiliency-mitigations.pdf |
|
Details | File | 1 | port_2022.pdf |
|
Details | File | 2 | lagebericht2021.pdf |
|
Details | File | 1 | 01139.pdf |
|
Details | File | 1 | supply-chain-cybersecurity.pdf |
|
Details | File | 2 | tion.pdf |
|
Details | File | 2 | cyber-security.pdf |
|
Details | File | 1 | port-2021_0913_pm_2.pdf |
|
Details | File | 20 | media.cer |
|
Details | File | 1 | port-volume1.pdf |
|
Details | File | 1 | vitchd-20210210.pdf |
|
Details | File | 1 | 6201530.html |
|
Details | File | 1 | cyber-war-hacking-expert-mandia-.html |
|
Details | File | 1 | 04940.pdf |
|
Details | File | 3 | target-security-breach-settlement.html |
|
Details | File | 384 | www.inf |
|
Details | File | 1 | nal_ready-for-publication-09242012_ac.pdf |
|
Details | File | 1 | ers.html |
|
Details | File | 1 | breach-may-affect-143-million-people-in-us.html |
|
Details | File | 1 | metrics.pdf |
|
Details | File | 23 | www.js |
|
Details | File | 12 | 3.pdf |
|
Details | File | 1 | cident-classification-taxonomy.pdf |
|
Details | File | 1 | house-policy-v12.html |
|
Details | File | 1 | omy_00cd828c-f851-afc4-0b1b416696b5f710_53646.pdf |
|
Details | File | 1 | 2740_volledige_tekst_tcm28-273243.pdf |
|
Details | File | 1 | viewtitle.aspx |
|
Details | File | 1 | 06862.pdf |
|
Details | IPv4 | 2 | 2.5.1.1 |
|
Details | IPv4 | 2 | 2.5.1.2 |
|
Details | IPv4 | 1 | 2.5.1.3 |
|
Details | IPv4 | 1 | 2.5.1.4 |
|
Details | IPv4 | 1 | 2.5.1.5 |
|
Details | IPv4 | 1 | 2.5.2.1 |
|
Details | IPv4 | 1 | 2.5.2.2 |
|
Details | IPv4 | 1 | 2.5.2.3 |
|
Details | IPv4 | 1 | 2.5.2.4 |
|
Details | IPv4 | 1 | 2.5.2.5 |
|
Details | Mandiant Uncategorized Groups | 8 | UNC2546 |
|
Details | MITRE ATT&CK Techniques | 52 | T1195 |
|
Details | MITRE ATT&CK Techniques | 183 | T1189 |
|
Details | Threat Actor Identifier - APT-C | 79 | APT-C-23 |
|
Details | Threat Actor Identifier - APT | 166 | APT31 |
|
Details | Threat Actor Identifier - APT | 143 | APT40 |
|
Details | Threat Actor Identifier - APT | 665 | APT29 |
|
Details | Threat Actor Identifier - APT | 522 | APT41 |
|
Details | Threat Actor Identifier - APT | 132 | APT32 |
|
Details | Threat Actor Identifier - APT | 66 | APT17 |
|
Details | Threat Actor Identifier - APT | 24 | APT19 |
|
Details | Threat Actor Identifier - APT | 278 | APT10 |
|
Details | Threat Actor Identifier - APT | 41 | APT5 |
|
Details | Url | 1 | https://css.ethz.ch/en/publications/risk-and-resilience-re- |
|
Details | Url | 1 | https://seclab.cs.ucdavis.edu/projects/history/pa- |
|
Details | Url | 1 | https://danielmiessler.com/study/red-blue-purple-teams/. |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/sci-2015 |
|
Details | Url | 1 | https://csrc.nist.gov/publi- |
|
Details | Url | 1 | https://www.cisa.gov/sites/default/files/publications/ict-scrm-task- |
|
Details | Url | 1 | https://link.springer.com/chapter/10.1007/978- |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/info-notes/supply-chain- |
|
Details | Url | 3 | https://www.mi |
|
Details | Url | 1 | https://www.atlantic |
|
Details | Url | 1 | https://www.enisa.europa.eu/publica- |
|
Details | Url | 1 | https://www.zdnet.com/article/fake- |
|
Details | Url | 1 | https://unidir.org/sites/default/files/2020- |
|
Details | Url | 1 | https://arxiv.org/abs/2002.01139 |
|
Details | Url | 1 | https://www.wired.com/story/so- |
|
Details | Url | 3 | https://arxiv.org/abs/2111.00169 |
|
Details | Url | 1 | https://www.newsd.admin.ch/newsd/message/attachments/67047.pdf |
|
Details | Url | 1 | https://www.justice.gov/opa/press-re- |
|
Details | Url | 1 | https://www.wired.co.uk/arti- |
|
Details | Url | 1 | https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code- |
|
Details | Url | 1 | https://blog.sonatype.com/npm-libraries-colors-and-faker-sabotaged-in- |
|
Details | Url | 1 | https://www.wired.com/story/open-source-sabotage-protestware/. |
|
Details | Url | 1 | https://www.welivesecurity.com/2021/06/09/gelsemium-when- |
|
Details | Url | 1 | https://www.eset.com/in/about/newsroom/press-releases/re- |
|
Details | Url | 1 | https://www.welivesecurity.com/2021/02/01/operation- |
|
Details | Url | 1 | https://www.jus |
|
Details | Url | 1 | https://www.forbes.com/sites/maggiemcgrath/2014/01/10/target-data- |
|
Details | Url | 1 | https://csrc.nist.gov/csrc/media/projects/supply-chain-risk-manage- |
|
Details | Url | 1 | https://www.lockheedmar |
|
Details | Url | 1 | https://www.christiandve.com/wp-content/uploads/2018/05/m- |
|
Details | Url | 1 | https://www.virsec.com/hubfs/solarwinds_tech- |
|
Details | Url | 12 | https://attack.mitre.org/. |
|
Details | Url | 1 | https://www.mitre.org/sites/default/files/publica- |
|
Details | Url | 1 | https://arxiv.org/pdf/2208.03466.pdf |
|
Details | Url | 1 | https://www.mitre.org/sites/default/files/2021-11/pr-18-0854-sup- |
|
Details | Url | 2 | https://attack.mi |
|
Details | Url | 1 | https://link.springer.com/chapter/10.1007/978-3-030-63322-6_9. |
|
Details | Url | 1 | https://www.cisa.gov/sites/de- |
|
Details | Url | 1 | https://carnegieendowment.org/2019/10/04/ict-supply-chain-in- |
|
Details | Url | 1 | https://capec.mitre.org/data/definitions/683.html |
|
Details | Url | 1 | https://www.cisa.gov/sites/default/files/publica- |
|
Details | Url | 1 | https://capec.mi |
|
Details | Url | 1 | https://www.darkreading.com/threat-intelligence/-goldenspy-malware- |
|
Details | Url | 1 | https://www.trust |
|
Details | Url | 1 | https://attack.mitre.org/software/s0493/. |
|
Details | Url | 1 | https://www.cisa.gov/us- |
|
Details | Url | 5 | https://securelist.com/operation-applejeus/87553 |
|
Details | Url | 2 | https://securelist.com/operation-applejeus/87553/. |
|
Details | Url | 1 | https://www.atlanticcouncil.org/commentary/feature/app-stores-in-fo- |
|
Details | Url | 1 | https://blog.check |
|
Details | Url | 1 | https://threatpost.com/analysis-shows-droiddream-trojan-designed-fu- |
|
Details | Url | 1 | https://threatpost.com/malicious- |
|
Details | Url | 1 | https://www.zdnet.com/article/geinimi-trojan-targets-android-de- |
|
Details | Url | 1 | https://arxiv.org/abs/2204.04008 |
|
Details | Url | 1 | https://www.aha.org/sys- |
|
Details | Url | 1 | https://usp.internet.byu.edu/static/papers/code-security-sp-2016.pdf |
|
Details | Url | 1 | https://arxiv.org/pdf/2111.00169.pdf |
|
Details | Url | 1 | https://incolumitas.com/2016/06/08/typosquatting- |
|
Details | Url | 1 | https://www.theregister.com/2020/04/21/rubygems_bitcoin_mal- |
|
Details | Url | 1 | https://arxiv.org/abs/1708.08519 |
|
Details | Url | 1 | https://ieeexplore.ieee.org/document/9229803/. |
|
Details | Url | 1 | https://blog.securityinnova |
|
Details | Url | 1 | https://blog.malware |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/phps-git-server- |
|
Details | Url | 1 | https://blog.sonatype.com/damaging-linux-mac-malware-bundled-within- |
|
Details | Url | 1 | https://dhiyaneshgeek.github.io/web/security/2021/09/04/dependency- |
|
Details | Url | 1 | https://link.springer.com/chap- |
|
Details | Url | 1 | https://arxiv.org/abs/2005.09535 |
|
Details | Url | 1 | https://www.prnewswire.com/news-releases/a-new- |
|
Details | Url | 1 | https://www.statista.com/statistics/1036027/leading-mobile-app-attribu- |
|
Details | Url | 1 | https://www.bleepingcom |
|
Details | Url | 1 | https://www.securi |
|
Details | Url | 1 | https://www.twilio.com/blog/incident-report- |
|
Details | Url | 1 | https://www.atlanticcouncil.org/resources/breaking-trust-the-dataset/. |
|
Details | Url | 1 | https://www.cpomagazine.com/cyber-security/asus-supply-chain-attack- |
|
Details | Url | 1 | https://securelist.com/operation-shadowhammer-a-high-pro- |
|
Details | Url | 1 | https://www.wired.com/2012/09/adobe-digital-cert-hacked/. |
|
Details | Url | 1 | https://www.mimecast.com/incident-report |
|
Details | Url | 1 | https://threatpost.com/mimecast- |
|
Details | Url | 1 | https://www.mimecast.com/incident-report/. |
|
Details | Url | 1 | https://www.csa.gov.sg/singcert/publications/the-multiplier-ef- |
|
Details | Url | 1 | https://www.al |
|
Details | Url | 1 | https://www.techrepublic.com/article/remote-work-and-increased- |
|
Details | Url | 1 | https://www.microsoft.com/security/blog/2021/10/25/nobelium-target- |
|
Details | Url | 1 | https://www.cisa.gov/uscert/ncas/alerts/aa22-131a. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/pl/security/news/cyber-at- |
|
Details | Url | 1 | https://baesystemsai.blog |
|
Details | Url | 1 | https://www.pwc.co.uk/cyber-se- |
|
Details | Url | 1 | https://www.aka |
|
Details | Url | 1 | https://processbolt.com/supply-chain-attacks. |
|
Details | Url | 3 | https://www.welivesecu |
|
Details | Url | 1 | https://blog.sucuri.net/2018/07/hiding-malware-inside-images-on-goog- |
|
Details | Url | 1 | https://blog.cloudflare.com/cloud- |
|
Details | Url | 1 | https://w3techs.com/technologies/details/cd-cdnjs. |
|
Details | Url | 1 | https://decoded.avast.io/luigicamastra/backdoored- |
|
Details | Url | 1 | https://thehackernews.com/2021/07/mongo- |
|
Details | Url | 1 | https://www.giac.org/paper/gicsp/724/impact-dragonfly-malware-indus- |
|
Details | Url | 1 | https://www.darkreading.com/vulnerabili- |
|
Details | Url | 1 | https://security.googleblog.com/2019/06/pha-family-high- |
|
Details | Url | 1 | https://arstechnica.com/in- |
|
Details | Url | 1 | https://www.kaspersky.com/blog/triada-trojan/11481 |
|
Details | Url | 1 | https://news.drweb.com/show/?i=11390&lng=en |
|
Details | Url | 1 | https://www.fcc.gov/lifeline- |
|
Details | Url | 1 | https://blog.malwarebytes.com/android/2020/07/we-found-yet-another- |
|
Details | Url | 1 | https://blog.malwarebytes.com/android/2020/01/united-states-govern- |
|
Details | Url | 1 | https://arstechnica.com/infor- |
|
Details | Url | 2 | https://www.kaspersky.com/about/press- |
|
Details | Url | 3 | https://www.kaspersky.com/about/press-releases/2017_shadowpad- |
|
Details | Url | 1 | https://www.sentinelone.com/labs/shadowpad-a-masterpiece-of-pri- |
|
Details | Url | 1 | https://securityaffairs.co/word- |
|
Details | Url | 1 | https://web.archive.org/web/20220120234401/https://www.contex |
|
Details | Url | 1 | https://www.atlanticcouncil.org/in- |
|
Details | Url | 1 | https://web.ar |
|
Details | Url | 1 | https://www.contex |
|
Details | Url | 1 | https://www.wired.com/2012/06/flame-microsoft-certificate |
|
Details | Url | 1 | https://www.radware.com/security/ddos- |
|
Details | Url | 4 | https://blog.talosintelligence.com/2017/07/the-medoc-connection.html |
|
Details | Url | 1 | https://attack.mitre.org/software/s0368/. |
|
Details | Url | 1 | https://www.thev |
|
Details | Url | 1 | https://blog.talosintelli |
|
Details | Url | 1 | https://www.lemonde.fr/pixels/article/2017/09/22/piratage-de-ccleaner- |
|
Details | Url | 1 | https://blog.avast.com/additional-information-regarding-the-recent- |
|
Details | Url | 1 | https://www.synopsys.com/software-integrity/resources/analyst-re- |
|
Details | Url | 1 | https://www.revenera.com/blog/software-composition-analy- |
|
Details | Url | 1 | https://www.welivesecurity.com/2020/12/10/luckymouse-ta428-compro- |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/threat- |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/threat-landscape-for-supply- |
|
Details | Url | 1 | https://www.welivesecurity.com/2020/12/17/operation-signsight-supply- |
|
Details | Url | 1 | https://insight-jp.nttsecu |
|
Details | Url | 1 | https://reports.wefo |
|
Details | Url | 1 | https://www3.weforum.org/docs/wef_the_global_risks_re- |
|
Details | Url | 1 | https://blog.npmjs.org/post/180565383195/details-about-the- |
|
Details | Url | 1 | https://www.bsi.bund.de/shareddocs/downloads/de/bsi/publikatio- |
|
Details | Url | 1 | https://arxiv.org/pdf/2002.01139.pdf |
|
Details | Url | 1 | https://www-file.huawei.com/-/me- |
|
Details | Url | 1 | https://csrc.nist.gov/publications/detail/sp/800- |
|
Details | Url | 1 | https://www2.deloitte.com/content/dam/deloitte/se/docu- |
|
Details | Url | 1 | https://www.sonatype.com/resources/white-paper-state-of-software- |
|
Details | Url | 1 | https://www.ncsc.govt.nz/assets/ncsc-documents/ncsc-supply-chain- |
|
Details | Url | 2 | https://www.microsoft.com/security/blog/2021/10/25/nobelium- |
|
Details | Url | 1 | https://obscuritylabs.com/blog/soft- |
|
Details | Url | 1 | https://www.microsoft.com/en-us/se- |
|
Details | Url | 1 | https://www.youtube.com/watch?v=vcaylxiewgw |
|
Details | Url | 1 | https://docs.broadcom.com/doc/istr-24-2019-en. |
|
Details | Url | 1 | https://www.mandi |
|
Details | Url | 1 | https://www.microsoft.com/security/blog/2018/07/26/attack-inception- |
|
Details | Url | 1 | https://www.crowdstrike.com/blog/global-survey-reveals-supply-chain- |
|
Details | Url | 1 | https://www.business |
|
Details | Url | 1 | https://www.sonatype.com/hubfs/q3%202021- |
|
Details | Url | 1 | https://www.csa.gov.sg/singcert/publications/the-chain-reaction |
|
Details | Url | 1 | https://csrc.nist.gov/glossary/term/logic_bomb |
|
Details | Url | 1 | https://www.newsd.ad |
|
Details | Url | 1 | https://media.cert.eu |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2021/11/18/ira- |
|
Details | Url | 1 | https://threatpost.com/lazarus-apt-it-supply-chain/175772/. |
|
Details | Url | 1 | https://docs.house.gov/meet- |
|
Details | Url | 1 | https://www.voanews.com/a/usa_sources-suspected-chinese-hackers- |
|
Details | Url | 1 | https://www.cnbc.com/2021/11/18/iran-leapfrogging-our-defenses-in- |
|
Details | Url | 1 | https://www.wyden.senate.gov/news/press-releases/wyden-lee-booker- |
|
Details | Url | 1 | https://www.wyden.sen |
|
Details | Url | 4 | https://www.reuters.com/article/us- |
|
Details | Url | 1 | https://www.bloom |
|
Details | Url | 1 | https://www.secarma.com/a-brief-history-of-supply-chain-attacks |
|
Details | Url | 1 | https://www.tomorrowunlocked.com/supply-chain-at- |
|
Details | Url | 1 | https://arxiv.org/pdf/1701.04940.pdf |
|
Details | Url | 1 | https://www.zdnet.com/article/anatomy-of-the-target-data-breach- |
|
Details | Url | 3 | https://www.ny |
|
Details | Url | 1 | https://www.ncsc.gov.uk/collection/supply-chain-security/watering-hole- |
|
Details | Url | 1 | https://attack.mitre.org/tech- |
|
Details | Url | 1 | https://www.infosecurity-magazine.com/news/the- |
|
Details | Url | 1 | https://threatpost.com/large-scale-water-hol- |
|
Details | Url | 1 | https://paper.see |
|
Details | Url | 1 | http://www.symantec.com/con- |
|
Details | Url | 1 | https://threatpost.com/large- |
|
Details | Url | 1 | https://www.word |
|
Details | Url | 1 | https://www.proofpoint.com/us/threat-insight/post/threat-actor- |
|
Details | Url | 1 | https://duo.com/labs/research/crxcavator- |
|
Details | Url | 1 | https://www.reu |
|
Details | Url | 1 | https://www.baesystems.com/en/cy- |
|
Details | Url | 1 | https://www.bbc.com/news/technology-28245598. |
|
Details | Url | 1 | https://www.ncsc.gov.uk/collection/supply-chain-security/website-build- |
|
Details | Url | 1 | https://blog.sonatype.com/chinese-military-implicated-in-equifax-breach. |
|
Details | Url | 1 | https://www.cnbc.com/2017/09/07/credit-reporting-firm-equifax-says- |
|
Details | Url | 1 | https://www.theguard |
|
Details | Url | 1 | https://www.thestar.com/business/2017/09/07/equifax-says-data- |
|
Details | Url | 1 | https://www.riskbasedsecu |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/malicious-rubygems- |
|
Details | Url | 1 | https://www.gartner.com/en/documents/2487216/definitionthreat-intel- |
|
Details | Url | 1 | https://irp.fas.org/eprint/metrics.pdf |
|
Details | Url | 1 | https://www.jstor.org/stable/26633163. |
|
Details | Url | 1 | https://www.euro |
|
Details | Url | 1 | https://www.trusted-introducer.org/in- |
|
Details | Url | 1 | http://www.ecsirt.net/cec/service/documents/wp4-clearing- |
|
Details | Url | 1 | https://ec.europa.eu/information_society/news- |
|
Details | Url | 1 | https://www.jstor.org/stable/26633163 |
|
Details | Url | 1 | https://ieeexplore.ieee.org/docu- |
|
Details | Url | 2 | https://dl.acm.org/doi/10.1145/997150.997156 |
|
Details | Url | 1 | https://www.igi-global.com/viewtitle.aspx?ti |
|
Details | Url | 1 | https://arxiv.org/ftp/arxiv/papers/2108/2108.06862.pdf |