It is a type of attack that utilizes implants and other vulnerabilities priorly implanted at any point in the life cycle to manipulate information technology products (hardware, software, operating system, peripherals) and damage an organization.
Supply chain attack
Learn Security Awareness
ATTACK Simulator is a fun and interactive way to teach your employees essential cybersecurity skills. We take care of security so you can take care of business.