Software Supply Chain Attacks: Taxonomy, Detection Methods, and Industry Impact
APA Citation
Kang, Y. & Mueller, D. (2024). Software Supply Chain Attacks: Taxonomy, Detection Methods, and Industry Impact. *ACM Computing Surveys*. https://doi.org/10.1145/3654321
View original paper →What Did This Cybersecurity Research Find?
This cybersecurity threat landscape survey cataloged software supply chain attack techniques and evaluated detection approaches across 200+ documented incidents. Cybersecurity teams face growing supply chain risk as open-source dependency attacks grew 742% from 2019 to 2024, making software bill of materials (SBOM) adoption a practical priority.
Key Findings
- 1Open-source dependency attacks grew 742% from 2019 to 2024
- 2Typosquatting and dependency confusion accounted for 54% of supply chain attacks
- 3SBOM adoption correlated with faster vulnerability identification (median 3 hours vs 72 hours)
- 4Automated dependency scanning caught 68% of known-malicious packages before deployment
- 5Only 23% of organizations maintained complete SBOMs for their software products in 2024
How Does This Apply to Cybersecurity Careers?
Security engineers and AppSec professionals need supply chain security skills. This research maps the attack surface and the detection techniques employers now expect.
Who Should Read This?
Frequently Asked Questions
What did this cybersecurity research find?
This cybersecurity threat landscape survey cataloged software supply chain attack techniques and evaluated detection approaches across 200+ documented incidents. Cybersecurity teams face growing supply chain risk as open-source dependency attacks grew 742% from 2019 to 2024, making software bill of materials (SBOM) adoption a practical priority.
How is this research relevant to cybersecurity careers?
Security engineers and AppSec professionals need supply chain security skills. This research maps the attack surface and the detection techniques employers now expect.
Where was this cybersecurity research published?
This study was published in ACM Computing Surveys in 2024. The DOI is 10.1145/3654321. Access the original paper through the publisher link above.
Explore Related Cybersecurity Resources
Get cybersecurity career insights delivered weekly
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Get Cybersecurity Career Intelligence
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options