The supply chain attack method leverages commonly-used dependency managers and private or non-existent dependencies to install malicious code and backdoors in internal applications.
Apple argued that Corellium's use of its software constituted a copyright violation; a federal judge has disagreed, throwing the case out on the basis of the company's software being a tool for security researchers.