◆ SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
Home / Tags

Supply-Chain-Attack

Supply Chain Attack — Compromising Trusted Vendors to Reach Downstream Targets
A supply chain attack occurs when threat actors compromise a trusted vendor, software provider, or service to gain indirect access to downstream customers. This SECMONS glossary entry explains how supply chain attacks work, common techniques, and how defenders should reduce third-party risk.
SolarWinds Supply Chain Compromise — Orion Platform Breach Analysis
The SolarWinds supply chain compromise involved malicious code inserted into Orion software updates, impacting government and enterprise organizations. This SECMONS record provides structured analysis of the incident, its impact, and defensive lessons.

Legal & Policies

  • Terms of Service (TOS)
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Affiliate Disclosure

Governance

  • Vulnerability Policy
  • Editorial Policy
  • Ethics & Governance
  • Methodology

Research & Intelligence

  • Research
  • Threat Actors
  • Zero-Day Tracker
  • Exploit Database
  • Reports

Resources

  • Resources
  • Sitemap
  • RSS

Company

  • Meet the Experts / Authors
  • About Us
  • Contact & Press
  • Careers / Join Us
© 2026 SECMONS. All rights reserved.
CtrlK
Search the site.