Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is a Supply Chain Attack?

A supply chain attack does not start with your firewall. It starts with someone else’s. Instead of targeting your company directly, a cyber attacker looks for weak spots in your organization’s supply chain. That could be a trusted third-party vendor, a widely used software supplier, or even an outdated package from an open-source code repository. Once they find an opening, they exploit security vulnerabilities to gain access to your systems without ever going through the front door.

Safeguarding Against Subdomain Takeover

Subdomain takeovers are a growing threat in today’s cloud-first ecosystem. As organizations rely on third-party services, continuously launch digital assets, and manage sprawling DNS configurations, they often leave behind vulnerable subdomains ripe for exploitation. In this article, we explore subdomain takeovers, why they pose such a serious risk, and most importantly, how to prevent them before threat actors strike.

Guide to Developing a Business Continuity Plan

In today’s threat-heavy digital environment, having a Business Continuity Plan (BCP) isn’t just smart, it’s essential. Whether it’s a cyberattack, data breach, ransomware, or natural disaster, organizations need a strategy to mitigate risks, reduce downtime, and ensure continued operations. This guide walks you through how to develop a cyber-ready BCP that protects your organization from disruption and prepares you for the unexpected.

CISOs: The Perfect SCORE With Your Board

You’ve done the work—mapped the risks, built the roadmap, secured the right tools. But when it’s time to face the board, the conversation stalls. Not because you’re wrong. Because you’re speaking a different language. Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there.

Automating Vendor Risk Management and Assessments

Third and fourth-party vendors have become paramount to many businesses’ operations, as they can help improve efficiency and expand the availability of services. However, these vendors often come with increased cybersecurity risks for your organization. According to Ponemon, the average cost of a data breach increases by more than $370,000 for breaches caused by third-party vendors.

The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality

SecurityScorecard is actively engaged to ensure our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles. This article is a continuation of a series of articles that describe how SecurityScorecard meets specific security rating principles as recommended by the US Chamber of Commerce.

Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks

North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named “Marstech1.” This malware is designed to compromise software developers and cryptocurrency wallets through manipulated open-source repositories. Unlike previous Lazarus operations, this campaign employs obfuscation techniques that make detection significantly harder. Read the full report here.

From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity

Supply chain security is no longer just an IT issue, it’s a critical business concern. As recent high-profile breaches like the MOVEit vulnerability have shown, a single vulnerability in a vendor’s system can have a cascading effect, disrupting operations and damaging reputations across the entire supply chain. This shift in the threat landscape demands a new approach to cybersecurity that prioritizes collaboration, resilience, and a proactive defense strategy.

Vendor Risk Assessment Template

When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss. Vendor risk assessments can help your organization narrow down who to trust, and help you identify the level of risk you are taking on with your vendors.

The Ultimate Data Breach Response Plan

In a hyper-connected world, security breaches continue to increase in size and scope. Cybersecurity threats come in various forms, from social engineering to database vulnerability exploitation. With that in mind, potential damages caused by these data breaches are more likely than ever, regardless of an organization’s size. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.