From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise
The past few years have shown us a tremendous shift in BEC attacks, which changed its strategies from Executive Impersonation to opting to impersonate third party vendors and suppliers instead. This shift has given the threat actors a plethora of additional trusted identities to exploit.
This Threat Intelligence Report gives all the possible insights on financial supply chain compromise and how they function.
Download the whitepaper and learn:
- The rise of financial supply chain compromise;
- How attackers impersonate vendors;
- The four types of financial supply chain compromise.