Tag

Supply Chain Attacks

Analyzes cyberattacks that target organizations through compromised suppliers, software updates, or third party components. Articles cover notable supply chain attack methods, detection techniques, prevention strategies, and how to build resilience against threats that exploit trusted vendor relationships.

posts

Third Party Risk

Third Party Vendor Cybersecurity Risk: A 2026 Guide

When Target lost 40 million credit card records in 2013, the attackers didn't breach Target directly. They compromised an HVAC vendor. Over a decade later, the playbook hasn't changed — it's just gotten more devastating. Third party vendor cybersecurity risk is now the single fastest-growing

Carl B. Johnson Apr 07, 2026 6 min read
Supply Chain Attacks

Supply Chain Attack Examples That Changed Cybersecurity

In December 2020, security firm FireEye discovered that a routine software update from SolarWinds had been weaponized to infiltrate roughly 18,000 organizations — including the U.S. Treasury, the Department of Homeland Security, and multiple Fortune 500 companies. The attackers didn't kick down the front door. They walked

Carl B. Johnson Sep 07, 2020 7 min read