Untitled design (17)

The Weakest Link in the Supply Chain: Beware of Third Party Hacks

Kobi Freedman Enterprise

There’s a shift happening in the world of cybercrime. This shift is towards using indirect attacks where hackers use compromised data, such as login credentials from individuals or smaller companies within a supply chain, to then access companies higher up the chain and ultimately infiltrate mass numbers of user accounts and their Personally Identifying Information (PII) therein. You can describe …