Guidance Is Coming, But Hackers Aren’t Waiting

Supply chains have become the soft underbelly of cybersecurity, with recent high-profile breaches demonstrating how attackers can exploit third-party vulnerabilities to infiltrate organisations. In 2022, the UK’s National Cyber Security Centre (NCSC) issued supply chain security guidance, aimed at helping organisations assess and secure their supplier networks. Still, supply chain attacks continue. 

More recently, further guidance is emerging, including the Cyber Assessment Framework (CAF) and the upcoming Cyber Security and Resilience Bill, action remains slow, and supply chain hacks continue to occur.

The UK government’s 2025 guidance on securing government supply chains highlights the need for stronger risk management, but in the interim, hackers are exploiting supply chain vulnerabilities in greater numbers than ever before. Which raises the question: is it time for businesses to push for stronger, industry-wide measures?

Why Supply Chains Are Increasingly Vulnerable

The risk associated with supply chains is escalating due to several factors:

Expanding digital ecosystems: Relying on a tapestry of third-party suppliers for cloud services, IT management, and operational support is the norma for many businesses now. However, each supplier presents a potential entry point for cyber threats.

More AI, more cyber threats:  AI is being weaponised by attackers to automate attacks, identify vulnerabilities at scale, and create highly convincing phishing campaigns. This exacerbates the challenge of securing supply chains, as AI-powered threats can adapt quickly. Similarly, if you’re adopting AI technologies and not applying rigorous due diligence to them, they come with significant risk. Don’t choose innovation over security. They need to go hand in hand.

Inadequate risk assessment:  Despite the increasing number of attacks, data from the NCSC suggests that only 13% of UK businesses regularly review the risks posed by their immediate suppliers, and just 7% assess their wider supply chain.

State-sponsored cyber espionage: Nation-state actors, such as China’s Silk Typhoon, are shifting tactics to target remote management tools and cloud services, which are often shared across multiple organisations.

Regulatory pressure and compliance challenges: As cyber threats increase, regulatory frameworks such as GDPR, NIS2, and DORA (for financial services) require stricter due diligence on suppliers, adding complexity to compliance efforts. Cybersecurity professionals are juggling a lot of different frameworks and priorities, with many indicating that they feel burnt out as reported by insights provider, Gartner.

Recent Attacks Highlighting Supply Chain Risks

Microsoft’s latest report on Silk Typhoon reveals a troubling evolution in supply chain cyber threats. The state-sponsored group has shifted its approach to target IT service providers, identity management solutions, and remote monitoring software. By exploiting unpatched applications and using stolen credentials, they can gain access to downstream customer networks and bypass traditional perimeter security measures.

Just one of many examples, the takeaway is clear: indirect access points through suppliers are an increasingly attractive vector for cybercriminals and it needs a solution.

Supply Chain Risk Regulation - What’s Happening Globally?

The European Union’s NIS2 Directive tightens security requirements for critical infrastructure providers, demanding stricter supplier risk assessments and real-time threat reporting. The United States’ Executive Order on Improving the Nation’s Cybersecurity mandates software bill of materials (SBOM) transparency for federal contractors to mitigate risks from vulnerable software components. Meanwhile, Asia-Pacific nations, including Australia and Japan, are implementing stricter cybersecurity supply chain frameworks, recognising the economic and national security implications of these attacks. 

Despite these measures, enforcement and compliance remain a challenge, with organisations needing to integrate global standards into their security strategies and juggle the evolving need and threats.

AI & The Future Of Supply Chain Cyber Threats

AI is a double-edged sword in cybersecurity with some heralding it as a future strength in threat detection, whereas others see it as potentially its greatest weakness. While organisations use AI-driven tools to detect anomalies and automate threat response, adversaries leverage AI for advanced cyberattacks. We’re seeing worrying trends:

  • AI-powered phishing campaigns can generate hyper-personalised attacks that bypass traditional detection mechanisms.
  • Machine learning models can be manipulated through adversarial attacks, potentially corrupting data integrity in AI-driven supply chain management systems.
  • Automated vulnerability discovery enables attackers to identify security gaps in supplier software much faster than traditional methods.

This means organisations must integrate AI-driven defence mechanisms, such as behaviour-based threat detection and automated patching, into their supply chain risk management strategies.

Best Practices For Securing Supply Chains

To strengthen resilience against supply chain cyber threats, taking a multi-layered approach is best, such as:

Zero Trust architecture: Adopt a Zero Trust model where no entity, internal or external, is automatically trusted. This includes enforcing least privilege access for suppliers.

Continuous third-party monitoring: Deploy continuous security monitoring solutions to detect anomalous behaviour in supplier networks.

Secure API and data access: Restrict supplier access to only the necessary systems and data and enforce API security measures.

Threat intelligence sharing: Collaborate with industry groups and government agencies to stay ahead of emerging threats.

Regular cybersecurity audits: Conduct independent audits of supplier security measures and ensure compliance with international cybersecurity standards.

Supply chain cyber risks are advancing. With the addition of AI, something that was once cutting-edge is now commonplace and opening the door to further risk. 

CAF, the Cyber Security and Resilience Bill and the supply chain guidance for public sector procurement represent a reassuring future-state when all are in play together. However, until that is in place, organisations must take charge of their own supply chain security, because waiting for the perfect alignment of guidance could mean waiting for a breach. 

Ed Bartlett is CEO at Hicomply

Image: 

You Mght Also Read:

Strengthening Britain's Cyber Defences:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« From Static Defenses To Dynamic Systems
Amazon Launches A Quantum Semiconductor Chip »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Black Cipher Security

Black Cipher Security

Black Cipher is a New Jersey-based cybersecurity and incident response consulting firm.