Guidance Is Coming, But Hackers Aren’t Waiting

Supply chains have become the soft underbelly of cybersecurity, with recent high-profile breaches demonstrating how attackers can exploit third-party vulnerabilities to infiltrate organisations. In 2022, the UK’s National Cyber Security Centre (NCSC) issued supply chain security guidance, aimed at helping organisations assess and secure their supplier networks. Still, supply chain attacks continue. 

More recently, further guidance is emerging, including the Cyber Assessment Framework (CAF) and the upcoming Cyber Security and Resilience Bill, action remains slow, and supply chain hacks continue to occur.

The UK government’s 2025 guidance on securing government supply chains highlights the need for stronger risk management, but in the interim, hackers are exploiting supply chain vulnerabilities in greater numbers than ever before. Which raises the question: is it time for businesses to push for stronger, industry-wide measures?

Why Supply Chains Are Increasingly Vulnerable

The risk associated with supply chains is escalating due to several factors:

Expanding digital ecosystems: Relying on a tapestry of third-party suppliers for cloud services, IT management, and operational support is the norma for many businesses now. However, each supplier presents a potential entry point for cyber threats.

More AI, more cyber threats:  AI is being weaponised by attackers to automate attacks, identify vulnerabilities at scale, and create highly convincing phishing campaigns. This exacerbates the challenge of securing supply chains, as AI-powered threats can adapt quickly. Similarly, if you’re adopting AI technologies and not applying rigorous due diligence to them, they come with significant risk. Don’t choose innovation over security. They need to go hand in hand.

Inadequate risk assessment:  Despite the increasing number of attacks, data from the NCSC suggests that only 13% of UK businesses regularly review the risks posed by their immediate suppliers, and just 7% assess their wider supply chain.

State-sponsored cyber espionage: Nation-state actors, such as China’s Silk Typhoon, are shifting tactics to target remote management tools and cloud services, which are often shared across multiple organisations.

Regulatory pressure and compliance challenges: As cyber threats increase, regulatory frameworks such as GDPR, NIS2, and DORA (for financial services) require stricter due diligence on suppliers, adding complexity to compliance efforts. Cybersecurity professionals are juggling a lot of different frameworks and priorities, with many indicating that they feel burnt out as reported by insights provider, Gartner.

Recent Attacks Highlighting Supply Chain Risks

Microsoft’s latest report on Silk Typhoon reveals a troubling evolution in supply chain cyber threats. The state-sponsored group has shifted its approach to target IT service providers, identity management solutions, and remote monitoring software. By exploiting unpatched applications and using stolen credentials, they can gain access to downstream customer networks and bypass traditional perimeter security measures.

Just one of many examples, the takeaway is clear: indirect access points through suppliers are an increasingly attractive vector for cybercriminals and it needs a solution.

Supply Chain Risk Regulation - What’s Happening Globally?

The European Union’s NIS2 Directive tightens security requirements for critical infrastructure providers, demanding stricter supplier risk assessments and real-time threat reporting. The United States’ Executive Order on Improving the Nation’s Cybersecurity mandates software bill of materials (SBOM) transparency for federal contractors to mitigate risks from vulnerable software components. Meanwhile, Asia-Pacific nations, including Australia and Japan, are implementing stricter cybersecurity supply chain frameworks, recognising the economic and national security implications of these attacks. 

Despite these measures, enforcement and compliance remain a challenge, with organisations needing to integrate global standards into their security strategies and juggle the evolving need and threats.

AI & The Future Of Supply Chain Cyber Threats

AI is a double-edged sword in cybersecurity with some heralding it as a future strength in threat detection, whereas others see it as potentially its greatest weakness. While organisations use AI-driven tools to detect anomalies and automate threat response, adversaries leverage AI for advanced cyberattacks. We’re seeing worrying trends:

  • AI-powered phishing campaigns can generate hyper-personalised attacks that bypass traditional detection mechanisms.
  • Machine learning models can be manipulated through adversarial attacks, potentially corrupting data integrity in AI-driven supply chain management systems.
  • Automated vulnerability discovery enables attackers to identify security gaps in supplier software much faster than traditional methods.

This means organisations must integrate AI-driven defence mechanisms, such as behaviour-based threat detection and automated patching, into their supply chain risk management strategies.

Best Practices For Securing Supply Chains

To strengthen resilience against supply chain cyber threats, taking a multi-layered approach is best, such as:

Zero Trust architecture: Adopt a Zero Trust model where no entity, internal or external, is automatically trusted. This includes enforcing least privilege access for suppliers.

Continuous third-party monitoring: Deploy continuous security monitoring solutions to detect anomalous behaviour in supplier networks.

Secure API and data access: Restrict supplier access to only the necessary systems and data and enforce API security measures.

Threat intelligence sharing: Collaborate with industry groups and government agencies to stay ahead of emerging threats.

Regular cybersecurity audits: Conduct independent audits of supplier security measures and ensure compliance with international cybersecurity standards.

Supply chain cyber risks are advancing. With the addition of AI, something that was once cutting-edge is now commonplace and opening the door to further risk. 

CAF, the Cyber Security and Resilience Bill and the supply chain guidance for public sector procurement represent a reassuring future-state when all are in play together. However, until that is in place, organisations must take charge of their own supply chain security, because waiting for the perfect alignment of guidance could mean waiting for a breach. 

Ed Bartlett is CEO at Hicomply

Image: 

You Mght Also Read:

Strengthening Britain's Cyber Defences:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« From Static Defenses To Dynamic Systems
Amazon Launches A Quantum Semiconductor Chip »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.