Dependency Confusion Attack
There’s a new supply chain attack in town.
Apps are no longer built from the ground up, but on top of pre-existing core systems, like databases, and widgets. But the more complex the apps, the harder it is to track dependencies between systems—opening the door to the dependency confusion attack. Learn more in this episode of the Juniper Threat Labs podcast.
How dependency confusion attack works
Using private vs. public repositories
How to safeguard your environment and protect yourself