Protect against Magecart using defence in depth: threat modeling, content security policy and subresource integrity.
Hacked supply chains are difficult to deal with. Here's a threat intel based process for cybersecurity supply chain management.
Phishing on LinkedIn is becoming more common. Here's an example of a phishing attack in LinkedIn's InMail, with recommendations on how to protect against such attacks.
How to improve cyber defense with actionable threat intelligence.