A Guide to Supply Chain Compromises: Don't let your supply chain be the chink in your cyber armour
by Airbus CyberSecurity’s Cyber Threat Intelligence (CTI) Team As a result of the recent SolarWinds[1] campaign, supply-chain compromises are getting more visibility. This technique consists of “manipulating a product prior to receipt by the final user to compromise the system or data”[2]. The affected product can be compromised by prior modification of the hardware, the