Vulnerability Management
PDF Supply Chain Attack Vectors: When Documents Become Weapons
PDFs are trusted by default in most organizations. That trust makes them a potent vector for supply chain attacks. Here is how the attacks work.
Feb 22, 20245 min read