“Automated Hunting of Software Update Supply Chain Attacks”

  Software that automatically updates itself presents an attack surface, which can be leveraged en masse through the compromise of the vendor’s infrastructure. This has been seen multiple times during 2017, with high profile examples includingNotPetya and CCleaner. Most large organisations have built robust perimeter defences for incoming and outgoing traffic, but this threat vector … Continue reading Automated Hunting of Software Update Supply Chain Attacks

This is a Security Bloggers Network syndicated blog post authored by Adam Kramer. Read the original post at: SANS Digital Forensics and Incident Response Blog