Tag

Supply Chain Security

Explores strategies for securing supply chains against cyberattacks, including vendor vetting, integrity verification, and monitoring practices. Covers real-world breaches and lessons learned to help organizations protect interconnected systems from compromise.

posts

Supply Chain Attack Examples

Supply Chain Attack Examples That Changed Cybersecurity

A Trusted Software Update Became the Biggest Backdoor in History In December 2020, FireEye disclosed that threat actors had compromised SolarWinds Orion — a network monitoring platform used by 33,000 organizations, including multiple U.S. federal agencies. The attackers embedded malicious code into a routine software update. Every organization that

Carl B. Johnson Apr 05, 2026 5 min read
Removed Legitimate Software

Removed Legitimate Software: A Hidden Attack Vector

When Trusted Tools Become Trojan Horses In April 2021, security researchers at Kaspersky documented a campaign where threat actors took software that had been removed legitimate from vendor websites — discontinued, deprecated, or pulled due to vulnerabilities — and repackaged it with embedded malware. The attackers then hosted these poisoned versions on

Carl B. Johnson Aug 08, 2021 7 min read
Third Party Risk Management

Third Party Vendor Cybersecurity Risk: A Practical Guide

In 2023, a single compromised file transfer tool — MOVEit — cascaded into breaches affecting over 2,600 organizations and roughly 90 million individuals. The threat actor, the Cl0p ransomware group, didn't need to hack each victim directly. They exploited one vendor, and the dominoes fell. That's third

Carl B. Johnson Jul 27, 2020 7 min read
Vendor Risk Management

Vendor Risk Management Cybersecurity: A Practical Guide

The Breach That Didn't Start With You In 2023, the MOVEit Transfer vulnerability didn't just hit Progress Software. It cascaded through thousands of organizations — government agencies, banks, healthcare systems — because those organizations trusted a single vendor's file transfer tool. Over 2,600 organizations and

Carl B. Johnson Jul 19, 2020 8 min read
Supply Chain Attack Examples

Supply Chain Attack Examples That Changed Cybersecurity

In December 2020, security firm FireEye disclosed that threat actors had compromised SolarWinds' Orion software platform — and with it, roughly 18,000 organizations that installed a poisoned update. Government agencies, Fortune 500 companies, and critical infrastructure operators all got hit through a single trusted vendor. That's the

Carl B. Johnson Aug 14, 2019 6 min read
Third Party Risk Management

Third Party Vendor Cybersecurity Risk: A Practical Guide

The Breach That Didn't Start With You In 2023, the MOVEit Transfer vulnerability didn't just hit one company. It cascaded through thousands of organizations that relied on a single file-transfer vendor. Government agencies, banks, healthcare systems, and universities all found themselves exposed — not because of anything

Carl B. Johnson Aug 14, 2019 7 min read
Vendor Risk Management

Vendor Risk Management Cybersecurity: A Practical Guide

The Breach That Didn't Start With You In 2023, the MOVEit Transfer vulnerability compromised over 2,600 organizations and exposed the data of more than 77 million individuals — not because those organizations had weak security, but because a single vendor did. Companies like Ernst & Young, the BBC,

Carl B. Johnson Aug 14, 2019 7 min read