Skip to main content
Mallory
Mallory

Escalating Software Supply Chain Security Risks and Industry Response

supply chainapplication securityvulnerabilitiesrisk managementCISA
Updated October 30, 2025 at 08:15 PM3 sources

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Recent high-profile incidents such as the SolarWinds, MOVEit, and Log4Shell breaches have underscored the critical vulnerabilities present in the software supply chain, prompting organizations to prioritize third-party risk management and supply chain security at the executive level. Security leaders now recognize that every external dependency, from open-source libraries to SaaS platforms, represents a potential attack vector, with 69% of organizations reportedly impacted by a supply chain security event in the past year. The MOVEit and SolarWinds attacks, in particular, demonstrated how a single compromised vendor can trigger widespread data breaches and operational disruptions across thousands of downstream organizations.

In response to these threats, companies are increasingly adopting third-party risk management tools and modern application security practices to monitor and secure their extended digital ecosystems. Industry reports highlight a gap between awareness and implementation of foundational security controls, with many organizations failing to mandate essential protections despite acknowledging the risks. Regulatory bodies such as CISA have also identified supply chain attacks as one of the most persistent and damaging threats, emphasizing the need for proactive, holistic risk management strategies that extend beyond internal systems to encompass the entire vendor ecosystem.

Sources

Related Stories

Supply Chain and Vulnerability Data Gaps Undermining Security Programs

A recent ISC2 survey of over 1,000 cybersecurity professionals highlights growing concern about the risks introduced by expanding vendor ecosystems and supply chain sprawl. Nearly 70% of organizations are worried about third-party supplier risks, with the highest concern in enterprises and sectors handling sensitive data such as finance and government. Lack of visibility into vendor and subcontractor security practices remains a critical challenge, with many organizations relying on trust rather than verification. One in three respondents reported experiencing a vendor-related security incident in the past two years, yet almost half did not feel a direct impact, raising questions about continuity and the reliability of vendor security claims. Compounding these risks, a Sonatype analysis reveals that the vulnerability scoring infrastructure, particularly the NVD and CVE programs, is failing to keep pace with modern software development practices. In 2025, 64% of open source CVEs lacked a CVSS score in the NVD, forcing security teams to make risk decisions with incomplete data. Discrepancies in severity ratings and significant delays—averaging six weeks between disclosure and scoring—undermine the effectiveness of automated security tools and response cycles. These gaps in both supply chain visibility and vulnerability intelligence are eroding confidence in the data that underpins security programs, increasing the likelihood of both missed threats and wasted resources.

3 months ago
Rising Impact of Supply Chain Attacks on Cyber Insurance and Enterprise Risk

Rising Impact of Supply Chain Attacks on Cyber Insurance and Enterprise Risk

Supply chain attacks have become a major concern for organizations, with industry data showing that breaches involving third parties have doubled year over year and now account for approximately 30% of all data breaches. These attacks, which often target digital supply chains such as open-source software, SaaS platforms, and cloud services, have proven to be highly disruptive and costly, with average remediation costs exceeding $4.9 million and significant operational downtime. The most impactful supply chain incidents of 2025 have demonstrated the potential for digital compromises to trigger both digital and physical disruptions across multiple organizations simultaneously. As the frequency and severity of supply chain attacks increase, cyber insurance providers are beginning to scrutinize policyholders' supply chain security controls more closely. Experts predict that the ability to obtain or renew cyber insurance—and even broader business-interruption coverage—will increasingly depend on the strength of an organization's software supply chain security and third-party risk management. While the current cyber insurance market is favorable for buyers, with lower premiums and broader coverage, this could change rapidly if supply chain-related claims continue to rise, prompting insurers to tighten requirements and increase rates.

2 months ago

Operational and Identity Risks in Modern Cloud and Supply Chain Security

Security teams are struggling to keep pace with the rapid evolution of cloud environments, where production workloads increasingly rely on multicloud and hybrid architectures. A recent study by Palo Alto Networks highlights that operational complexity, fast-paced software deployments, and the integration of generative AI into development pipelines are outpacing the ability of security controls to adapt, resulting in high-severity vulnerabilities reaching production. Data exposure risks are exacerbated by fragmented environments, overly broad identity permissions, and weak secret management, with manual processes still prevalent for identifying sensitive data and managing access. Supply chain security remains a critical weak point, as attackers exploit third-party access to compromise systems and propagate malicious activity across interconnected organizations. The Thales Digital Trust Index report reveals that over half of organizations retain third-party access long after it is needed, creating persistent vulnerabilities. Weak authentication practices, inefficient identity lifecycle management, and poor access hygiene further increase the risk of breaches originating from trusted partners, underscoring the need for robust controls and continuous evaluation of third-party relationships.

2 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.