Supply Chain Attack

Supply Chain Attack image
Your web app will depend on libraries and third-party components outside your control. For example, Social media (SoMe) trackers and CSS or similar plugins. Over time, they might be insecure or outdated. This is known as a supply chain attack, when something you already trust becomes the way attackers get in.

Tip: Keep a list of them and the last working version on your end.

Examples: One famous example was log4j and another was SolarWinds. 
See you at TestBash Brighton 2025. image
Proud TestBash sponsor! Visit the Test Exchange to meet our expert software testing team.
Explore MoT
Plymouth Meetup image
Tue, 14 Oct
Second Plymouth Software QA and Testing Meetup Group in Southway
MoT Software Testing Essentials Certificate image
Boost your career in software testing with the MoT Software Testing Essentials Certificate. Learn essential skills, from basic testing techniques to advanced risk analysis, crafted by industry experts.
This Week in Testing image
Debrief the week in Testing via a community radio show hosted by Simon Tomes and members of the community
Subscribe to our newsletter
We'll keep you up to date on all the testing trends.