{"id":20922,"date":"2024-06-05T14:51:40","date_gmt":"2024-06-05T14:51:40","guid":{"rendered":"https:\/\/interface.media\/?p=20922"},"modified":"2024-06-05T14:51:47","modified_gmt":"2024-06-05T14:51:47","slug":"blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/","title":{"rendered":"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0"},"content":{"rendered":"\n<p>Designed to exploit weaknesses in third party suppliers, a software supply chain attack turns a trusted supplier into an unsuspecting Trojan horse. In recent years, collective awareness of cyber risk has grown, leading to widespread adoption of stronger safety measures. This has made direct attacks on large organisations more challenging.&nbsp;<\/p>\n\n\n\n<p>So, hackers have turned to enterprises\u2019 supplier networks as a new source of vulnerabilities to exploit. Smaller software suppliers often have weaker security measures, making them easier targets. Once compromised, these suppliers&#8217; software can be injected with malicious code, providing hackers with a way to breach their target from within.<\/p>\n\n\n\n<p>The results can be <a href=\"https:\/\/interface.media\/blog\/2024\/04\/10\/can-ai-companies-stop-ai-from-interfering-in-the-2024-us-elections-part-one\/\">catastrophic<\/a>. According to <a href=\"https:\/\/www.blackberry.com\/us\/en\/campaigns\/2022\/na\/software-supply-chain-security\">a new report from BlackBerry<\/a>, UK companies are especially likely to be at risk of cyberattack in their supply chain.\u00a0<\/p>\n\n\n\n<p>&nbsp;\u201cUnknown components and a lack of visibility on the software supply chain introduce blind spots containing potential vulnerabilities that can wreak havoc across not just one enterprise, but several, through loss of data and intellectual property, operational downtime along with financial and reputational impact,\u201d commented Christine Gadbsy, VP of Product Security at BlackBerry in the report. \u201cHow companies monitor and manage cybersecurity in their software supply chain has to rely on more than just trust.\u201d<\/p>\n\n\n\n<p>BlackBerry\u2019s report highlighted the 2020 hacking campaign which targeted a vulnerability in SolarWinds software and managed to penetrate US government departments including the Department of Homeland Security and part of the Pentagon. New research from BlackBerry highlights the extent of the problem for UK software supply chain security.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-uk-firms-battered-by-cybersecurity-threats-nbsp\">UK firms battered by cybersecurity threats&nbsp;<\/h3>\n\n\n\n<p>BlackBerry\u2019s study found that four out of five software supply chains have been either notified of <a href=\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/\">a vulnerability or the target of cyber attacks<\/a> in the past year.\u00a0<\/p>\n\n\n\n<p>Out of those who experienced an attack, 59% were operationally compromised, 58% lost data, 55% lost intellectual property, 52% suffered a perceived loss to their reputation, and 49% were hurt financially.&nbsp;<\/p>\n\n\n\n<p>Recovery times following an attack were also longer than ideal for many firms. Nine out of ten companies took up to a month for their operations to recover following a software supply chain attack. According to BlackBerry\u2019s researchers, \u201cthe damage to reputation and brand lasts much longer.\u201d<\/p>\n\n\n\n<p>This data not only identified an increase in attack frequency but also shows a greater financial impact compared to data from 2022.<\/p>\n\n\n\n<p>One alarming discovery from the report was the presence of hidden entities within software supply chains. According to BlackBerry, three in four businesses uncovered hidden entities in their supply chain, with over two-thirds (68%) of businesses only recently identified these unknown participants.&nbsp;<\/p>\n\n\n\n<p>This vulnerability typically arises as the result of gaps in regulatory and compliance processes. Troublingly, fewer than 20% of UK companies request security compliance evidence from suppliers beyond the initial onboarding stage.<\/p>\n\n\n\n<p>Also, despite reporting high levels of confidence in their suppliers&#8217; ability to identify and prevent vulnerabilities, few companies consistently verified compliance. This lack of verification and visibility, the report\u2019s authors argue, leaves opportunities for cyber criminals to exploit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers. <\/p>\n","protected":false},"author":480,"featured_media":20923,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-06-05T14:51:44Z","apple_news_api_id":"dd51d27a-54c4-429a-a1cd-3ead391318d2","apple_news_api_modified_at":"2024-06-05T14:51:44Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/A3VHSelTEQpqhzT6tORMY0g","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613],"class_list":["post-20922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0 - Interface<\/title>\n<meta name=\"description\" content=\"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-05T14:51:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T14:51:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1320\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/\",\"name\":\"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0 - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg\",\"datePublished\":\"2024-06-05T14:51:40+00:00\",\"dateModified\":\"2024-06-05T14:51:47+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg\",\"width\":1320,\"height\":795,\"caption\":\"Mountain landscape dark poster monochrome abstract geometric with wavy grid texture. Metaverse concept background for wall art, interior decor, panel, poster, web banner, mobile apps, interior decor.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0 - Interface","description":"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0","og_description":"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.","og_url":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/","og_site_name":"Interface","article_published_time":"2024-06-05T14:51:40+00:00","article_modified_time":"2024-06-05T14:51:47+00:00","og_image":[{"width":1320,"height":795,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/","url":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/","name":"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0 - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg","datePublished":"2024-06-05T14:51:40+00:00","dateModified":"2024-06-05T14:51:47+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"The majority of software supply chains in the UK regularly face cyber threats as hackers exploit unguarded third party suppliers.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-2012851450.jpg","width":1320,"height":795,"caption":"Mountain landscape dark poster monochrome abstract geometric with wavy grid texture. Metaverse concept background for wall art, interior decor, panel, poster, web banner, mobile apps, interior decor."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/06\/05\/blackberry-uk-software-supply-chains-under-unrelenting-threat-of-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"BlackBerry: UK software supply chains under unrelenting threat of attack\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=20922"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20922\/revisions"}],"predecessor-version":[{"id":20924,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20922\/revisions\/20924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/20923"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=20922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=20922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=20922"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=20922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}