Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

The Top Threats Undermining the Security of Software Supply Chains

By Paul Davis
Two monitors opened up to coding software
Fotis Fotopoulos via Unsplash
September 9, 2025

The software supply chain is evolving at an unprecedented rate, exposing organizations to more threats than ever before. As companies race to innovate and developers struggle to keep up, they often find themselves adding a number of new tools, frameworks, and open-source components into their environments to ease the burden. While this drive for agility and innovation is essential for companies to maintain a competitive edge, it also introduces new layers of complexity and risk throughout the software supply chain. 

Each new tool introduces more complexity for developers and security teams, plus potentially unforeseen vulnerabilities that may be difficult to detect until it’s too late. As teams rely more heavily on open source and shared components, threats such as malicious packages, exposed secrets, and CVEs are multiplying at an alarming rate. 

In 2024 alone, security researchers disclosed over 33,000 new CVEs — a 27% increase from 2023, surpassing the 24.5% growth rate of new software packages. This rise in CVEs adds significant pressure on developers and security teams, potentially hindering innovation as they instead look to remediate these dangerous threats. 

Attackers are also quick to exploit these weak points, knowing that a single compromised component can trigger extensive consequences. In addition to immediate financial losses, organizations risk lasting reputational damage and erosion of customer trust if sensitive data is exposed. Take a recent breach to Marks and Spencer for example — cybercriminals not only disrupted critical operations, but also wiped out nearly $400 million from its group operating profits. 

The scale and speed at which these components are adopted can make it difficult for DevSecOps  teams to keep up, especially when resources are limited and priorities are constantly shifting. To remain competitive and resilient, organizations must be equipped with the right tools to face the most significant security risks head-on, while keeping pace with the ever-evolving threat landscape.

The top security concerns 

Software supply chains are facing a barrage of sophisticated, rapidly evolving cybersecurity threats that challenge even the most robust security postures. As organizations increasingly depend on third-party components, open-source libraries, and more, the attack surface has expanded dramatically. In this high-stakes landscape, safeguarding software supply chains has become a critical mission for organizations of all sizes.

Recent research found four key factors impacting the integrity and security of the software supply chain:

  • Common Vulnerabilities and Exposures (CVEs): In 2024, over 33,000 new CVEs were disclosed — a 27% increase from 2023. Yet, only 12% of these CVEs rated "critical" truly warranted this score. It’s like a fire alarm constantly triggered by something minor like burnt toast — eventually, people begin to tune it out, increasing the risk of missing a real fire. This alert fatigue can create critical gaps in protection, exposing organizations to dangerous attacks which could have been prevented.
  • Malicious packages: The growing popularity of public repositories allows threat actors to upload malicious packages that are masquerading as legitimate software. Developers under pressure to move quickly may unknowingly download these compromised packages, creating hidden entry points to launch devastating attacks against the enterprise. Without the proper vetting, monitoring, and controls in place, a single malicious package can cause a ripple effect through the software supply chain, resulting in widespread organizational risk.
  • Secrets’ exposures: The accidental exposure of secrets such as API keys, credentials, and tokens, unintentionally left embedded in code remains a persistent and growing threat to organizations. In 2024 alone, 25,229 exposed secrets and tokens were detected in public repositories — a staggering 64% increase year-over-year. As developers continue to deliver new innovations at a rapid pace, the risk of secrets being unintentionally leaked also rises in parallel which can lead to significant impacts across the software supply chain.
  • Misconfigurations/human errors: As environments become more complex and interconnected, the consequences of a single misstep are amplified and can expose the software supply chain to a range of risks such as exposing sensitive data or disrupting critical systems. This risk of human error rises when you consider pressures developers face to not only remediate critical vulnerabilities, but also prioritize new innovations in software development. Without the proper tools in place, human error driven threats will only increase.

While the volume of threats to the software supply chain continues to rise, building security into software development from the very beginning can help ensure a more proactive line of defense against these pervasive threats. This also gives security leaders greater flexibility with the open-source or publicly developed AI/ML code, better control over their software development, limits CVE exploitation, and the confidence to innovate securely in a complex digital landscape. 

Shift left to stay ahead 

As the software supply chain grows more complex and dynamic, the risks facing organizations multiply — and so does the need for stronger, more adaptive security measures. Conventional security methods are falling short in today’s threat landscape, as security teams are often unaware of critical vulnerabilities facing their organizations until it’s too late.

For example, a significant number of organizations still allow developers to pull software components directly from public registries without validation that they are secure. While the practice may be convenient and expedient, it opens the door to organization-wide risk and limits traceability which is the lifeblood of a secure software supply chain. 

To help teams stay vigilant and better remediate against these prominent threats to their software supply chains, security leaders should embody the “shift left” mentality to bake security into every step of the development lifecycle. This includes deploying tactics such as contextual analysis for CVEs, constantly scanning for malicious packages before they are introduced into an environment, building in secrets detection mechanisms, and more to better protect every level of the software supply chain. 

Security leaders must embrace robust cyber hygiene practices, such as scanning at both the code and binary levels, integrating curation with secrets detection, and applying advanced contextual analysis throughout the software development life cycle. By proactively reinforcing every stage of development, organizations can outpace evolving threats and build a stronger, more resilient software supply chain. 

KEYWORDS: software software security Supply Chain Disruptions supply chain risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Davis is the Field CISO at JFrog.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    82% of CIOs believe their software supply chains are vulnerable

    See More
  • Locked vault

    Fortifying the software supply chain: A crucial security practice

    See More
  • green and pink pyramid on blue screen

    70% of security leaders see software supply chain as top blind spot

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing