Supply chain attacks have emerged as one of the most effective and devastating attack vectors. By compromising a single vendor, attackers can gain access to thousands of downstream organizations.
Notable Supply Chain Attacks
From SolarWinds to Kaseya to 3CX, supply chain attacks have demonstrated that even well-defended organizations can be compromised through their trusted vendors. The 3CX attack was particularly notable as it was a supply chain attack launched from another supply chain attack.
Software Bill of Materials (SBOM)
The push for SBOMs — detailed inventories of all software components — is gaining momentum. Executive Order 14028 requires SBOMs for software sold to the U.S. government, and the practice is spreading to the private sector.


