From 47d60a4b51a51482e88e6921a556f7367434eea7 Mon Sep 17 00:00:00 2001 From: Eric Avena Date: Tue, 16 Oct 2018 22:55:03 +0000 Subject: [PATCH] Updated supply-chain-malware.md --- .../threat-protection/intelligence/supply-chain-malware.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/supply-chain-malware.md b/windows/security/threat-protection/intelligence/supply-chain-malware.md index 31e68f0df4..340a2bf9f0 100644 --- a/windows/security/threat-protection/intelligence/supply-chain-malware.md +++ b/windows/security/threat-protection/intelligence/supply-chain-malware.md @@ -17,7 +17,7 @@ Supply chain attacks are an emerging kind of threat that target software develop ## How supply chain attacks work -[!video https://www.youtube.com/embed/uXm2XNSavwo] +> [!video https://www.youtube.com/embed/uXm2XNSavwo] Attackers hunt for unsecure network protocols, unprotected server infrastructures, and unsafe coding practices. They break in, change source codes, and hide malware in build and update processes.