Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical Security

The New Era of Supply Chain Attacks: When One Falls, All Fall

By Chad LeMaire
Person holding red puzzle piece
Ryoji Iwata via Unsplash
October 27, 2025

The Log4j vulnerability in 2021 served as a wake-up call for how vulnerable today’s supply chains are. Four years later, this remains apparent amid the recent incident at F5 which has impacted a number of businesses globally. These types of attacks continue to expose the increasingly sophisticated cyber threats that exist as a result of a growingly complex landscape.

Third-party ecosystems are now one of the most profitable attack avenues as when one supplier is compromised, the effects can quickly ripple through entire industries. All partners are then exposed to fallbacks like revenue loss, reputational damage and operational disruption.

Why Traditional Risk Management Falls Short

Legacy risk management approaches can’t keep up with modern threats. Things like static assessments and compliance audits only provide a snapshot of risk, and many security professionals don’t have the necessary visibility into the security posture of their partners, creating blind spots for attackers to easily exploit.

Additionally, legacy frameworks don’t account for shifts in threat actor behavior. For example, attackers increasingly use AI tools to boost their capabilities or find vulnerabilities within their target’s environments. They also continue exploiting legacy systems that may have outdated security measures or compromised credentials as another path of entry. These new (and familiar) tactics represent a class and speed of threats that many organizations’ defense and evaluation plans have not fully prepared for with their original security investments.

Risk management remains mostly reactive rather than proactive, leaving organizations vulnerable when partners are compromised. Traditional models are inadequate against the sophistication of today’s attackers, especially those who target supply chains.

Attackers Exploiting Trusted Relationships

Attackers are focusing more on supply chain relationships and third-party integrations as a way to compromise multiple organizations at once. Their approach is straightforward: compromise one system, and then quickly access an entire ecosystem.

This tactic has been evident in recent incidents. For example, the Collins Aerospace MUSE software attack disrupted operations at several European airports, while campaigns targeting Salesforce customers spread through tools like Salesloft Drift. Similarly, the ShinyHunters ransomware group exploited Salesforce CRM, causing widespread effects across various enterprises, including Workday.

Attackers treat vendors and partners as backdoors and use AI-driven tools to launch targeted social engineering and phishing campaigns. Using AI, attackers coordinate attacks more effectively by quickly finding vulnerable users, then personalizing attacks to improve their ROI.

Identity compromise is particularly risky and a rapidly emerging entry point for threats. A stolen credential can easily bypass traditional defenses, opening access to multiple downstream systems and targets. Once past perimeter defense, we’re seeing that attackers can navigate through networks faster than ever through software vulnerabilities, lateral movement and identity theft. If they’re successful in breaching one partner, they can then move onto targeting other integrations, partners and customers.

Steps for Improving Resilience and Visibility

Today’s supply chain defenses need a proactive and collaborative approach. Security leaders cannot underestimate the power of continuous monitoring across their partnerships. For example, sharing threat intelligence helps identify potential risks before they become more serious incidents. This is essential in ensuring that operations continue and maintaining trust across stakeholders.

Security is a shared responsibility, and collaborating with partners on responses and procedures is critical. A proactive approach to threat detection, backed by AI prioritization, for example, can help address increasing attacks like social engineering by identifying behaviors that differ from the norm of a specific user, device, or system. These solutions are also valuable in identifying unauthorized access, lateral movements, or data filtration attempts, so that organizations can keep better pace with the threat landscape.

From a technical perspective, network detection and response provide better visibility to monitor traffic patterns and lateral movements that may indicate a partner has fallen victim to an attack. Additionally, developing an incident response playbook specifically for third-party attacks is critical. To address the likely ripple effects, it should include preventive measures, strategies for containment and recovery plans.

The Importance of Shared Defenses

Attacks on supply chains are not only here to stay, but they are also increasing. Amid evolving threats, security leaders must embrace modern tactics to replace traditional defenses. No organization can afford to fall behind in visibility into the threat landscape and better collaboration across partner networks.

It’s also important for leaders to adopt a shared defense mindset. By adopting continuous monitoring, robust threat detection capabilities, and better sharing of threat intelligence, they can develop a more proactive approach to increasing supply chain attacks. This not only protects individual organizations but improves the security hygiene of the entire supply chain.

KEYWORDS: risk management supply chain cyber security supply chain management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chad lemaire headshot

Chad LeMaire is CISO at ExtraHop. Image courtesy of LeMaire 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

critical event management

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Computer screen displaying code

    Are AI data poisoning attacks the new software supply chain attack?

    See More
  • supply chain images

    7 Strategies to Defend Against Supply Chain Risks in the Digital Era

    See More
  • cyber data

    CISA and NIST release new interagency resource: Defending against software supply chain attacks

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing