The cyberthreat landscape is evolving as threat actors develop new tactics to keep up with increasingly sophisticated corporate IT environments. In particular, threat actors are increasingly exploiting supply chain vulnerabilities to reach downstream targets. The effects of supply chain cyberattacks are far-reaching, and can affect downstream organizations. The effects can also last long after the … Continue Reading