While every corporate network large and small tries hard to implement security policies to ensure users are only able to work with legitimate applications and data services -- when the core software supply chain itself is compromised, then the threats themselves gain a new level of legitimacy. Users are often troublesome, but the threats can start in the pipe itself.
Support the originator by clicking the read the rest link below.