{"id":14756,"date":"2025-09-09T07:39:00","date_gmt":"2025-09-09T07:39:00","guid":{"rendered":"https:\/\/newestek.com\/?p=14756"},"modified":"2025-09-09T07:39:00","modified_gmt":"2025-09-09T07:39:00","slug":"71-of-cisos-hit-with-third-party-security-incident-this-year","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14756","title":{"rendered":"71% of CISOs hit with third-party security incident this year"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Many enterprises are at growing risk due to immature supply chain cybersecurity practices and outdated strategies.<\/p>\n<p>The majority (71%) of organizations experienced at least one material third-party cybersecurity incident in the past year, and 5% reported 10 or more such incidents, according to a <a href=\"https:\/\/securityscorecard.com\/ja\/company\/press\/securityscorecard-report-reveals-5-in-6-organizations-at-risk-due-to-immature-supply-chain-security\/\">recent survey of 546 IT directors and CISOs by cybersecurity ratings vendor SecurityScorecard<\/a>.<\/p>\n<p>Third-party involvement in breaches has doubled in recent years, surging from 15% to nearly 30%, according to supporting data from the <a href=\"https:\/\/www.csoonline.com\/article\/3970094\/cybercriminals-switch-up-their-top-initial-access-vectors-of-choice.html\">2025 Verizon Data Breach Investigations Report<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"sprawling-ecosystem-increases-supply-chain-risks\">Sprawling ecosystem increases supply chain risks<\/h2>\n<p>Enterprises depend on vast networks of suppliers, partners, and digital service providers to deliver their products and services. This sprawling ecosystem greatly increases the attack surface cybercriminals, ransomware peddlers, and nation state-attackers can exploit.<\/p>\n<p>\u201cAttackers rarely go straight through the front door anymore,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/mourtzinosvasileios\/?originalSubdomain=ca\">Vasileios Mourtzinos<\/a>, threat intelligence analyst at cybersecurity consultancy firm Quorum Cyber. \u201cThey target the suppliers, SaaS platforms, and service providers we all depend on.\u201d<\/p>\n<p>Recent attacks involving <a href=\"https:\/\/www.csoonline.com\/article\/4046407\/attackers-steal-data-from-salesforce-instances-via-compromised-ai-live-chat-tool.html\">Salesforce<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/4042191\/shinyhunters-strike-again-workday-breach-tied-to-salesforce-targeted-social-engineering-wave.html\">Workday<\/a>, and <a href=\"https:\/\/www.csoonline.com\/article\/4041372\/uks-colt-hit-by-cyberattack-support-systems-offline-amid-ransom-threat.html\">Colt Technology<\/a> show how a \u201csingle weak link in the supply chain can cause a ripple effect of damage,\u201d Mourtzinos added.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/gregoryasullivan\/\">Greg Sullivan<\/a>, founding partner at cybersecurity services firm CIOSO Global and former CIO at Carnival, says, \u201cOrganizations often enable online access to third parties without applying the same scrutiny they use with their own internal software and applications. This negligence creates blind spots that adversaries often exploit.\u201d<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/arielparnes\/\">Ariel Parnes<\/a>, a former Colonel in Israel\u2019s IDF 8200 Cyber Unit and co-founder of incident response vendor Mitiga, agrees that SaaS platforms represent a \u201cthird-party dependency and a direct supply chain risk.\u201d<\/p>\n<p>\u201cRecent campaigns against Salesforce customers, and the <a href=\"https:\/\/www.carriermanagement.com\/news\/2025\/08\/25\/278778.htm\">breach at Farmers Insurance<\/a>, show how these attacks cascade across industries,\u201d Parnes says. \u201cNow, threat groups like Murky Panda are skipping the front door and exploiting trusted cloud and SaaS relationships instead.\u201d<\/p>\n<p>Parnes adds: \u201cBy abusing OAuth, stolen credentials, or over-permissioned integrations, they \u2018log in\u2019 rather than break in, bypassing traditional defenses. By compromising these upstream entities, they were able to inherit the trust and permissions that downstream organizations had already granted.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"software-supply-chain-threats\">Software supply chain threats<\/h2>\n<p>The <a href=\"https:\/\/www.csoonline.com\/article\/570743\/6-most-common-types-of-software-supply-chain-attacks-explained.html\">software supply chain<\/a> is heavily reliant on code developed by third-party developers \u2014 something only <a href=\"https:\/\/www.csoonline.com\/article\/4015077\/ai-supply-chain-threats-are-looming-as-security-practices-lag.html\">likely to increase with the advent of AI<\/a>.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/brianefox\/\">Brian Fox<\/a>, co-founder and CTO of open-source software security vendor Sonatype, says that \u201cenormously complex\u201d software supply chains pose a growing threat.<\/p>\n<p>\u201cToo many organizations have no idea what open-source packages, transitive dependencies, AI models, or community-maintained libraries they rely on \u2014 let alone who maintains them or whether they\u2019re secure,\u201d Fox tells CSO. \u201cThere\u2019s a persistent and growing trend in software supply chain attacks targeting developers and CI\/CD environments.\u201d<\/p>\n<p>Attackers are planting malicious code on public repositories such as npm and PyPI \u2014 often disguised as useful packages \u2014 as a means to compromise systems, steal data, or provide backdoor access during development or deployment.<\/p>\n<p>\u201cAttackers are refining <a href=\"https:\/\/www.sonatype.com\/press-releases\/q2-2025-open-source-malware-index\">data exfiltration-focused malware<\/a> to harvest secrets and credentials, enabling downstream attacks like supply chain breaches or cloud account takeovers,\u201d Fox warns.<\/p>\n<p>Lack of visibility is compounding a growing problem, according to <a href=\"https:\/\/www.linkedin.com\/in\/nickojones\/?originalSubdomain=uk\">Nick Jones<\/a>, head of research at cybersecurity consulting firm Reversec.<\/p>\n<p>\u201cAttackers compromise open-source projects supported by underpaid and under-resourced individuals, or startups where security isn\u2019t a priority, in order to insert malicious code into packages used downstream by much higher value targets,\u201d Jones says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"lessons-not-taken-from-the-solarwinds-breach\">Lessons not taken from the SolarWinds breach<\/h2>\n<p>Software supply chains weaknesses were exploited in the high-profile <a href=\"https:\/\/www.csoonline.com\/article\/570191\/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html\">2020 SolarWinds hack<\/a>, but five years later the same issue plagues the industry.<\/p>\n<p>Once a software development pipeline itself is compromised, every customer downstream inherits that risk.<\/p>\n<p>The best defense is to get a clear picture of your entire software supply chain \u2014 its assets, tools, pathways, and controls \u2014 and then work to ensure the proper guardrails are in place, according to Joe Nicastro, field CTO at application security firm Legit Security.<\/p>\n<p>\u201cWe still see build pipelines misconfigured, third-party code and packages flowing in without checks, and SBOMs treated as one-off documents instead of living inventories,\u201d Nicastro tells CSO.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/573185\/what-is-an-sbom-software-bill-of-materials-explained.html\">Software bill of materials (SBOMs)<\/a> allow an organization to understand what it\u2019s really running under the hood, down to the individual libraries and packages.<\/p>\n<p>\u201c[SBOMs are] being pushed by numerous industry organizations, including CISA, and are a requirement under the EU Cybersecurity Resilience Act (<a href=\"https:\/\/www.european-cyber-resilience-act.com\/\">CRA<\/a>), but every software vendor has to produce their own SBOMs for their products, and so industrywide has been slow so far,\u201d Reversec\u2019s Jones says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"lack-of-visibility\">Lack of visibility<\/h2>\n<p>Few organizations have comprehensive visibility into their entire supply chain much less the ability to monitor the cyber hygiene of every supplier and their downstream partners.<\/p>\n<p>SecurityScorecard found that only 21% of those surveyed were able to say at least half of their extended supply chain was covered by cybersecurity programs. Only a quarter (26%) of organizations incorporate incident response into their supply chain cybersecurity programs.<\/p>\n<p>\u201cBreaches persist because third-party risk management remains largely passive, focused on assessments and compliance checklists rather than action,\u201d says <a href=\"https:\/\/securityscorecard.com\/people\/leadership\/ryan-sherstobitoff\/\">Ryan Sherstobitoff<\/a>, field chief threat intelligence officer at SecurityScorecard.<\/p>\n<h2 class=\"wp-block-heading\" id=\"countermeasures\">Countermeasures<\/h2>\n<p>\u201cVendor diligence must go <a href=\"https:\/\/www.csoonline.com\/article\/4002765\/third-party-risk-management-is-broken-but-not-beyond-repair.html\">beyond questionnaires<\/a>,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/scott-weinberg-49414\/\">Scott Weinberg<\/a>, founder and CEO of managed IT services provider Neovera. \u201cBusiness associate agreements need more diligence. CISOs should require evidence of controls (MFA, logging, EDR), audit rights, and proof of breach notification timelines.\u201d<\/p>\n<p>Legit Security\u2019s Nicastro adds: \u201cTo address this issue, organizations must impose clear cybersecurity maturity expectations on all partners, including mandating penetration tests, annual assessments, phishing simulations, tabletops, and resilience exercises.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Many enterprises are at growing risk due to immature supply chain cybersecurity practices and outdated strategies. The majority (71%) of organizations experienced at least one material third-party cybersecurity incident in the past year, and 5% reported 10 or more such incidents, according to a recent survey of 546 IT directors and CISOs by cybersecurity ratings vendor SecurityScorecard. Third-party involvement in breaches has doubled in recent&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14756\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14756","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14756"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14756\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}