Supply Chain Attack

Supply Chain Attack image
Your web app will depend on libraries and third-party components outside your control. For example, Social media (SoMe) trackers and CSS or similar plugins. Over time, they might be insecure or outdated. This is known as a supply chain attack, when something you already trust becomes the way attackers get in.

Tip: Keep a list of them and the last working version on your end.

Examples: One famous example was log4j and another was SolarWinds. 
Explore MoT
Leading With Quality Lean Coffee image
Quality leadership conversations in a virtual lean coffee format
MoT Software Testing Essentials Certificate image
Boost your career in software testing with the MoT Software Testing Essentials Certificate. Learn essential skills, from basic testing techniques to advanced risk analysis, crafted by industry experts.
This Week in Quality image
Debrief the week in Quality via a community radio show hosted by Simon Tomes and members of the community
Subscribe to our newsletter
We'll keep you up to date on all the testing trends.