An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which
of the following vectors is being exploited?
A. Social media
B. Cloud
C. Supply chain
D. Social Engineering
of the following vectors is being exploited?
A. Social media
B. Cloud
C. Supply chain
D. Social Engineering