The Hidden Danger in Our Software Supply Chain
October 08, 2024

Emma Zaballos
CyCognito

Software supply chain attacks are rising fast, targeting organizations' vulnerabilities with increasing sophistication. High-profile cases like MOVEit Transfer, Apache Log4J, and Polyfill created holes in the defenses of thousands of organizations, emphasizing the need for stronger security. As businesses rely more on third-party software providers, their attack surfaces grow, often leaving them exposed to hidden threats from managed assets.

CyCognito recently conducted an analysis of over 39 million data points from a diverse range of companies, providing concrete evidence validating the growing concerns about the vulnerability of our software supply chains.

The report's findings reveal a troubling reality: our digital ecosystems are far more vulnerable than we'd like to believe. This isn't just another cybersecurity warning — it's a critical issue that demands immediate attention from business leaders, IT professionals, and policymakers alike.


Web Servers: The Achilles' Heel of Cybersecurity

The report's most alarming finding is that web servers account for one in three severe issues among surveyed assets. These include known platforms Apache, NGINX, Microsoft IIS, and Google Web Server that many organizations rely on. Given how critical these servers are to digital infrastructure, this level of vulnerability is extremely dangerous. If left unaddressed, these weaknesses could lead to major security breaches and system failures.

Encryption Protocols: Not as Secure as We Thought

Even more alarming is the state of our encryption protocols. The report found that 15% of all severe issues on the attack surface affect platforms using TLS or HTTPS protocols. TLS issues are significant for all network-delivered data, but web apps especially so; web apps lacking encryption are currently ranked #2 of the OWASP Top 10.

Personal Data at Risk

Perhaps the most concerning aspect of the report is its findings on personal data protection. Only half of the web interfaces handling personally identifiable information (PII) are protected by a Web Application Firewall (WAF). This lack of protection for our most sensitive data is unacceptable in today's threat landscape.

Despite HTTPS celebrating its 30th birthday this year, almost one in three (31%) of surveyed web interfaces failed to implement it. More than 60% of these interfaces that expose PII also lack a WAF.

A Call to Action

These findings clearly highlight that businesses must prioritize cybersecurity at every level of their operations. This involves rigorous testing and vetting of all software, whether developed in-house or sourced from third parties. Companies must implement robust security measures throughout their software supply chains and cultivate a culture of cybersecurity awareness among employees.

Consumers, too, have a role to play. We need to be more discerning about our digital security by asking tough questions regarding how companies protect our data. Holding businesses accountable for their security practices should become second nature, and we must be willing to prioritize safety over convenience, even if it means sacrificing some ease of use.

Policymakers must step up as well. Stronger regulations and enforcement mechanisms are essential to ensure that companies take adequate steps to protect their software supply chains. Increased funding for cybersecurity research and education will help build a workforce capable of tackling these challenges head-on. Additionally, developing policies that incentivize better security practices within the private sector is crucial for long-term improvement.

The Road Ahead

The vulnerabilities exposed in the report are not abstract concepts — they are real weaknesses that could be exploited at any moment, potentially leading to data breaches, financial losses, and erosion of public trust.

We face a choice: continue with business as usual and hope we're not the next victim, or take decisive action to secure our digital infrastructure. The stakes are too high for half-measures or quick fixes. We need a comprehensive, coordinated effort to address the vulnerabilities in our software supply chains.

Emma Zaballos is Senior Researcher at CyCognito
Share this

Industry News

March 06, 2025

Parasoft(link is external) is showcasing its latest product innovations at embedded world Exhibition, booth 4-318(link is external), including new GenAI integration with Microsoft Visual Studio Code (VS Code) to optimize test automation of safety-critical applications while reducing development time, cost, and risk.

March 06, 2025

JFrog announced general availability of its integration with NVIDIA NIM microservices, part of the NVIDIA AI Enterprise software platform.

March 06, 2025

CloudCasa by Catalogic announce an integration with SUSE® Rancher Prime via a new Rancher Prime Extension.

March 05, 2025

MacStadium(link is external) announced the extended availability of Orka(link is external) Cluster 3.2, establishing the market’s first enterprise-grade macOS virtualization solution available across multiple deployment options.

March 05, 2025

JFrog is partnering with Hugging Face, host of a repository of public machine learning (ML) models — the Hugging Face Hub — designed to achieve more robust security scans and analysis forevery ML model in their library.

March 05, 2025

Copado launched DevOps Automation Agent on Salesforce's AgentExchange, a global ecosystem marketplace powered by AppExchange for leading partners building new third-party agents and agent actions for Agentforce.

March 05, 2025

Harness completed its merger with Traceable, effective March 4, 2025.

March 04, 2025

JFrog released JFrog ML, an MLOps solution as part of the JFrog Platform designed to enable development teams, data scientists and ML engineers to quickly develop and deploy enterprise-ready AI applications at scale.

March 04, 2025

Progress announced the addition of Web Application Firewall (WAF) functionality to Progress® MOVEit® Cloud managed file transfer (MFT) solution.

March 04, 2025

Couchbase launched Couchbase Edge Server, an offline-first, lightweight database server and sync solution designed to provide low latency data access, consolidation, storage and processing for applications in resource-constrained edge environments.

March 04, 2025

Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI.

March 03, 2025

Aviatrix® announced the launch of the Aviatrix Kubernetes Firewall.

March 03, 2025

ScaleOps announced the general availability of their Pod Placement feature, a solution that helps companies manage Kubernetes infrastructure.

March 03, 2025

Cloudsmith raised a $23 million Series B funding round led by TCV, with participation from Insight Partners and existing investors.

February 27, 2025

IBM has completed its acquisition of HashiCorp, whose products automate and secure the infrastructure that underpins hybrid cloud applications and generative AI.