Dear All,
There are multiple points where software supply chains can be compromised. Cyberattacks, insider threats, or other malign activities at any stage of a product lifecycle can be used by threat actors to achieve access, enable espionage, conduct sabotage, or launch follow-on attacks against other parties. See NCSC’s guidance:
Software Supply Chain Attacks
Kyaw Myo Oo
Information Security Program Manager , CB BANK PCL
CCIE #58769 | CISSP | PMP | CCSM | SAA-C03 | PCNSE
https://www.linkedin.com/in/kyaw-myo-oo/