Adversaries Use Third-Party Vulnerabilities to Enhance Stealth, Speed, and Impact of Ransomware Attacks, Reports Intelligent CISO

Published:

spot_img

Research Findings on Concentrated Cyber Risk and Resilience in a Global Economy

SecurityScorecard, in partnership with McKinsey & Company, has released alarming findings from its latest research on cyber risk. The report, titled “2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research,” highlights the extreme concentration of cyber risk in just 15 vendors, posing significant threats to national security and global economies.

According to Dr. Aleksandr Yampolskiy, CEO and Co-Founder of SecurityScorecard, the reliance on a handful of vendors is akin to a precarious house on a cliff edge, creating potential single points of failure in the global economy. The research also reveals a surge in adversaries exploiting third-party vulnerabilities to carry out supply chain cyberattacks with maximum stealth, speed, and impact.

The study identified that 150 companies account for 90% of the technology products and services across the global attack surface, with 41% of them showing evidence of compromised devices in the past year. Additionally, 62% of the external attack surface is concentrated in the products and services of just 15 companies, which have below-average cybersecurity risk ratings, increasing the likelihood of breaches.

In response to these findings, experts recommend four key steps to mitigate supply chain cybersecurity risks, including identifying single points of failure, continuously monitoring the attack surface, detecting new vendors automatically, and operationalizing vendor cybersecurity management.

Charlie Lewis, Partner at McKinsey, emphasized the need for companies to consider the broader system of their cyber ecosystem and build mutual support with peers, competitors, and vendors to enhance resilience against cyber threats. The research underscores the critical importance of addressing vulnerabilities in third-party relationships to safeguard against cyber risks in the interconnected digital landscape.

spot_img

Related articles

Recent articles

Trump Administration Unveils 2026 Cyber Strategy and Executive Order to Strengthen Cybersecurity Against Adversaries

Trump Administration Unveils 2026 Cyber Strategy and Executive Order to Strengthen Cybersecurity Against Adversaries On March 6, 2026, the Trump Administration announced the release of...

Youth Drive Sustainable Agricultural Mechanization in Africa’s Agrifood Revolution

Youth Drive Sustainable Agricultural Mechanization in Africa's Agrifood Revolution Introduction: The Urgency of Mechanization in Sub-Saharan Africa As the rainy season approaches in sub-Saharan Africa (SSA),...

Iran War Accelerates Economic Strain on Egypt Amid Rising Energy Costs

Iran War Accelerates Economic Strain on Egypt Amid Rising Energy Costs The ongoing U.S.-Israeli military actions against Iran are exerting significant pressure on Egypt's already...

Iran-Linked Hackers Intensify Attacks on U.S. Critical Infrastructure

Iran-Linked Hackers Intensify Attacks on U.S. Critical Infrastructure Washington | As geopolitical tensions escalate between Iran and Western nations, cybersecurity experts report a significant uptick...