Jan. 30, 2023, 2:47 p.m. | chris@kerr.ventures (Chris Romeo)

ReversingLabs Blog blog.reversinglabs.com




There is no debate that the software supply chain is filled with action. It’s the front lines of the security world these days. If you have a shadow of a doubt, search the history of SolarWinds, Codecov, or CircleCI for examples of how attackers use the supply chain as a gateway of compromise.

action attackers bills circleci codecov compromise gateway history misconceptions search security security world shadow software software bill of materials (sbom) software supply chain software supply chain security solarwinds supply supply chain world

More from blog.reversinglabs.com / ReversingLabs Blog

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden