Cyberattacks often target an enterprise’s use of software for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of data or stealing controlled information. Many well-known attacks have exploited vulnerabilities and weaknesses in software and within software supply chains; an issue that spans both proprietary and open source software, which impacts both private sector and government enterprises.

| Format: | 
 | 
| Topics: | |
| Website: | Visit Publisher Website | 
| Publisher: | Cybersecurity and Infrastructure Security Agency (CISA) | 
| Published: | August 1, 2024 | 
| License: | Public Domain |