Supply chain compromise is fast becoming a key attack vector for adversaries targeting operational technology (OT). These threats are no longer limited to theoretical discussions or isolated cases.
“Logitech believes that the unauthorized third party used a zero-day vulnerability in a third-party software platform and copied certain data from the internal IT system,” the filing reads. The ...
An interbank data communication system was restored in the morning of Oct. 12, following two days of malfunctions that ...