Supply Chain Attack
Compromise of a trusted software vendor, update channel, or third-party library to distribute malicious code to downstream customers through legitimately signed artifacts.
Triage
1 procedureContainment
2 proceduresP1
Roll Back and Block the Compromised Release
~120 min
P1
Contain Compromised Serverless Function
~90 min
Sponsored