Supply Chain Attacks Explained
Following the Shai Hulud worm and its Shai Hului 2.0 follow up, supply chain attacks have gained visibility in the development space. But what are they? How can we prevent them? What can we do when we build embedded systems? Spoiler alert: audit, pin versions, identify packages based on cryptographic hashes, use SBOMs, scan for […]
Supply Chain Attacks Explained Read More »

