Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»AI & Tech»Mitigating supply chain vulnerabilities | TechRadar
    AI & Tech

    Mitigating supply chain vulnerabilities | TechRadar

    techupdateadminBy techupdateadminSeptember 12, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Protection from AI hacker attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The recent arrests of four suspects linked to cyber attacks on major UK retailers like Marks and Spencer, Co-op and Harrods serve as a stark reminder of how vulnerable today’s supply chains truly are.

    These attacks, which caused massive disruption earlier this year and reportedly cost M&S alone around £300 million in damages, highlight a disturbing trend in the cybersecurity landscape. Threat actors are no longer simply going after individual organizations.

    They are targeting interconnected networks, exploiting trust within supply chains and leveraging the weakest link to gain access to critical systems.


    You may like

    Dan Schiappa

    Social Links Navigation

    President of Technology and Services at Arctic Wolf.

    These kinds of attacks have become increasingly common, not solely because of the rapid technological advancement of threat actors’ tools, but because, put simply, they work.

    When an attacker compromises a third-party vendor, whether that third-party is a Fortune 500 company or a small supplier, they can often bypass the traditional defenses of their actual target by using legitimate credentials or disguising their activity as that of a trusted entity.

    Once inside the digital environment of their actual target, they move laterally, deploying ransomware or exfiltrating sensitive data before an in-house IT or security team realizes what’s happening.

    The evolving threat landscape

    In the case of the attacks on UK retailers, authorities believe a group associated with the cyber gang, Scattered Spider, was behind the attack. They used impersonation and social engineering to breach third-party systems, eventually gaining access to the larger supermarket networks.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    This approach, which exploits human trust and organizational blind spots, is not new, and in fact has been made immeasurably easier by advances in generative AI, enabling criminals to fake audio, visual and text messages with near-perfect accuracy to their targets.

    The current scale and success rate that these types of attacks operate with has forced a necessary reckoning across the cybersecurity community.

    To defend against these threats, businesses must rethink how they manage cybersecurity across the entire supply chain. It is no longer enough to secure your own perimeter.


    You may like

    You must also understand and help enforce security standards for every vendor, supplier and partner you work with, and constantly be re-evaluating these standards.

    Extending cybersecurity to third parties

    A recent report found more than 62% of initial cybersecurity deployments revealed one or more latent threats (a hidden or dormant risk within an environment that hadn’t been detected by the organization’s existing security measures). It’s time for leadership to understand that thoroughly vetting your vendors before giving them access to internal systems is absolutely essential.

    This should include reviewing their security practices, ensuring they conduct regular assessments, establishing a clear incident response plan and actively promoting a culture of security awareness.

    Beyond these measures, businesses need to apply strict limitations to what vendors can access, utilizing a least-privilege approach and a zero-trust model, giving vendors access only to the systems and data they need for their work and nothing more.

    It is also essential to establish baseline cybersecurity standards for all third parties. These should include data encryption practices, access controls, patch management procedures and multi-factor authentication. These measures form the foundation of a resilient ecosystem and ensure consistency in how threats are mitigated.

    Visibility and monitoring are also two critical pieces of the puzzle. Many organizations have limited insight into their environments, especially when it comes to vendor-connected assets.

    That lack of visibility allows threats to linger undetected. To address this, organizations should create and maintain an accurate inventory of all assets, including those accessed by external parties, and establish 24×7 monitoring of logs, endpoints and user behavior to detect deviations from normal activity.

    Establishing a baseline of what “normal” looks like is key to identifying early warning signs of compromise. When a threat actor attempts to move laterally or access something unusual, those changes stand out more clearly against a well-understood baseline.

    Securing the entire ecosystem

    Now is the time to take action. Begin by reviewing your current supply chain security posture. Identify where access is granted, what controls are in place and where gaps may exist.

    Strengthen vendor agreements to include security expectations. Implement zero-trust and least-privilege models. Improve monitoring, both across your own environment and in coordination with key partners.

    Cybersecurity is no longer a single-organization challenge. It is an ecosystem issue. And securing that ecosystem requires shared accountability, visibility, and vigilance at every level.

    We list the best patch management software.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    chain Mitigating supply TechRadar vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleToday’s Wordle clues, hints and answer for September 12 #1546
    Next Article Put the Q-Tip Down. Here’s How to Safely Clean Your Ears
    techupdateadmin
    • Website

    Related Posts

    AI & Tech

    Don’t Overpay for a Travel Bag. My $20 Backpack Does the Job for Way Less

    November 26, 2025
    AI & Tech

    This Fitbit Sense 2 Black Friday deal saves you up to 30% on one of our favorite beginner fitness trackers

    November 26, 2025
    AI & Tech

    My Top 3 Noise-Canceling Headphone Tricks for Calmer, Anxiety-Free Flights

    November 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.