Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      7 MagSafe accessories that I recommend every iPhone user should have

      June 1, 2025

      I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

      June 1, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025
      Recent

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

      June 1, 2025

      Rilasciata PorteuX 2.1: Novità e Approfondimenti sulla Distribuzione GNU/Linux Portatile Basata su Slackware

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Supply Chain Resilience and Physical Security: Lessons for 2025

    Supply Chain Resilience and Physical Security: Lessons for 2025

    December 27, 2024

    Supply Chain Attack

    Physical and software supply chain risks make up an increasingly large part of the threat landscape. Here are the evolving risks – and solutions. 

    The increasing interconnectedness and dependencies in the modern world have created supply chain and partner risks for organizations that may go unnoticed until disruptive events occur. 

    Data from Cyble and others suggest that 40% or more of data breaches are supply-chain related. Software and physical supply chains are so fraught with risk and interdependencies that it can be difficult for organizations to stay on top of them, but there are steps companies can take to reduce those risks. 

    We’ll look at the state of supply chain and partner risk in 2024 – and what may be in store for 2025, along with some risk monitoring and management strategies that can help reduce those risks. 

    Software Supply Chain Attacks Evolve 

    Supply chain attacks burst into consciousness with the SolarWinds and Kaseya breaches of 2020-2021, and if anything, risk has increased since then. 

    While software update hacks like the one SolarWinds experienced are relatively rare, the fact is that software supply chain risks are so vast as to be underappreciated. Software, hardware, managed services, cloud services and SaaS applications are all part of the software supply chain, and all could introduce vulnerability risk. 

    IT vulnerabilities are some of the most sought-after by threat actors on dark web marketplaces because of their vast reach. Of 770 dark web claims involving U.S. entities that Cyble dark web researchers deemed credible enough to report to clients in the first 11 months of 2024, IT and IT services companies far outpaced the other 20 sectors studied (chart of the top 4 below). 

    Sector  Dark Web Exploits 
    IT and IT Services  146 
    Government  93 
    Banking and Financial Services  82 
    Healthcare  73 

    A vulnerability doesn’t need a million web-exposed vulnerable assets to be dangerous – or valuable. One of the most interesting examples of 2024 was a Versa Director zero-day vulnerability that had only 31 web-facing vulnerable instances – yet it apparently led to downstream customer attacks because some of those vulnerable instances belonged to internet service providers (ISPs) and managed service providers (MSPs). 

    While it wasn’t a supply chain attack, one of the biggest cyber incidents of 2024 was the faulty CrowdStrike update that hit roughly 8.5 million Windows machines – no incident better highlights the risky interdependencies of the software supply chain. 

    Other 2024 incidents that demonstrated the reach of the software supply chain included the CDK cyberattack that crippled North American car dealerships – showing the interconnected nature of the physical and software supply chains – and the Snowflake breach that exposed the data of 165 prominent organizations. 

    Even CISA and MITRE couldn’t escape software supply chain threats in 2024, as both got hit by Ivanti vulnerabilities. 

    Open source software – present even in many commercial products – is another software supply chain risk, making a software bill of materials (SBOM) an important protection against unknown vulnerabilities. 

    In fact, any ransomware or data breach that began with a vulnerability exploit – or escalated because of one – could be considered at least in part a software supply chain incident. 

    Physical Security: Not Just for Supply Chains 

    Physical supply chains face many risks – financial, geopolitical, operational, shipping, logistics, climate, natural disasters – that make planning and risk diversification and management especially important. 

    Physical security is important for supply chain management and function as well as for many other sectors and uses, including for critical infrastructure and executive travel. In recent years, an alarming rise in physical and geopolitical risk has been affecting all sectors, as well as increased risks for executives. 

    Access control applies to physical as well as virtual risks, and with physical threats increasing, locking down access to critical areas of your organization is an important security consideration. 

    Physical threat intelligence is an emerging tool for monitoring physical threats regardless of type and location, whether they affect a local office or warehouse or an executive on the other side of the globe. With advanced algorithms analyzing data from sources such as video surveillance, sensor data, and social media monitoring, these tools allow for rapid alerts, response and adjustments for greater control over physical and supply chain risks. 

    Controlling Supply Chain and Physical Risks 

    The software and physical supply chains can both be better protected with comprehensive threat intelligence platforms that include features such as: 

    • Third-party risk management (TPRM) tools that alert organizations to potential partner risks before they become a crisis; 
    • Physical threat intelligence for avoiding physical threats that could disrupt operations; 
    • Dark web monitoring for detecting leaks and threats before they become bigger issues. 

    One Cyble case study of a supply chain company documented a 45% drop in fraud and scams after the company implemented a threat intelligence solution that included partner risk management. 

    Understanding supply chain risk through tools like SBOM and TPRM are essential for controlling risk. Proper access control applies to both partners and users – third-party suppliers should be given only the access they need, and configuration and segmentation are other important security controls. Security can also be built into supplier contracts via service-level agreements (SLAs) and followed up with regular audits. 

    2025 Supply Chain Outlook 

    With a dramatic change in direction in the U.S. political landscape, 2025 may usher in even more volatility, and shifting global alliances and economic direction will make rapidly responding to business risks and threats more important than ever. Tariffs pledged by U.S. President-elect Donald Trump have the potential to disrupt both the supply chain and the economy. 

    And as cybercriminals and threat actors continue to weaponize AI to create increasingly sophisticated cyberattacks, 2025 will once again make a strong case for the comprehensive protection that AI-powered threat intelligence platforms offer. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePalo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately
    Next Article FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 1, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Unable to set proxy with BrowserMobProxy while modifying http header request in Selenium with Java

    Development

    Empowering YouTube creators with generative AI

    Artificial Intelligence

    How to assign an IP to a seleniumGrid

    Development

    Watermarking AI-generated text and video with SynthID

    Artificial Intelligence

    Highlights

    Development

    AI and Open Source Security: The Critical Role of AI-Powered Fuzzing in Finding Flaws

    November 22, 2024

    Artificial Intelligence (AI) is the hottest online commodity right now, and its integration into AI…

    CVE-2025-21470 – Apache Image Toolkit Buffer Overflow

    May 6, 2025

    CVE-2024-8100 – Arista CloudVision Portal – Token Privilege Escalation

    May 8, 2025

    Generative Engine Optimization (GEO): The Future of SEO in the Age of AI-Powered Search

    April 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.