Skip to content
Search AI Powered

Latest Stories

Report: E-mail vulnerabilities threaten supply chains

58% of organizations experienced an attempted supply chain attack in the past year, and poor e-mail security may be to blame, cybersecurity firm data show.

banner-5217685_640.jpg

Nearly 60% of organizations have experienced an attempted supply chain attack in the past year, and e-mail vulnerabilities are a prime route to damage, according to data from Waltham, Mass.-based e-mail and cybersecurity firm GreatHorn.


The firm's Threat Intelligence Team released data showing that one of the most prominent techniques used in supply chain attacks is a form of man-in-the-middle (MitM) attack, in which an attacker compromises login credentials to leverage legitimate e-mail communication between parties in order to carry out their supply chain attack. Known as Vendor Email Compromise (VEC), the method allows attackers to log into a user’s e-mail so they can pose as that user and leverage trusted relationships in the user’s supply chain to take advantage of existing e-mail threads, or data, the company said.

“Given the quantity of workers remaining in a remote capacity, and the increase in phishing attacks that lead to malicious sites that compromise credentials, an organization’s supply chain has become a significant target for cybercriminals,” according to GreatHorn’s research on defending against vendor e-mail compromise. “With 3.7% of all e-mails containing potentially malicious links that bypass native e-mail security controls, and 41% of organizations stating that users click on malicious links daily, identifying links that attempt to harvest credentials is the first step for organizations in securing and protecting their users from account takeovers.”

To help prevent attacks, the research shows companies should augment or replace traditional e-mail security approaches with more sophisticated techniques; those include advanced computer vision programs that can analyze suspicious links and prevent employees from accessing password-stealing accounts, as well as biometric authentication programs that can recognize a user’s unique typing patterns such as keystroke speed, pressure, timing, and more.

“Attackers will continue to launch continuous attacks against supply chain partners, gaining access to supplier systems, including e-mail. Identifying spoofed vendors/individuals that can send malicious links and compromised partner accounts calls for advanced e-mail security techniques,” according to the company. “By augmenting or replacing traditional e-mail security approaches with more sophisticated capabilities, organizations can detect and mitigate the risk of supply chain attacks.”

The Latest

More Stories

map of Roadrunner freight routes

Roadrunner CEO and partner buy ownership stake in company

The CEO of less than truckload (LTL) trucking company Roadrunner Freight has joined with a partner to buy out a majority ownership interest in the Chicago-based company from its private equity owners.

Roadrunner CEO Chris Jamroz made the move through Prospero Staff Capital, a private equity vehicle that he co-leads with the investor Ted Kellner, buying the stake from Elliott Investment Management L.P.

Keep ReadingShow less

Featured

chart of port of oakland container traffic

Port of Oakland import volume approaches pre-pandemic level

The Port of Oakland’s container volume continued its growth in the fourth quarter, as total container volume rose 10% over the same period in 2023, and loaded imports grew for the 12th straight month, approaching pre-pandemic levels.

Specifically, loaded import volume rose 11.2% in October 2024, compared to October 2023, as port operators processed 81,498 TEUs (twenty-foot containers), versus 73,281 TEUs in 2023, the port said today.

Keep ReadingShow less
office workers using GenAI

Companies feel growing pressure to invest in GenAI

In a rush to remain competitive, companies are seeking new ways to apply generative AI, expanding it from typical text-based applications to new uses in images, audio, video, and data, according to a report from the research and advisory firm Information Services Group (ISG).

A growing number of organizations are identifying ways to use GenAI to streamline their operations and accelerate innovation, using that new automation and efficiency to cut costs, carry out tasks faster and more accurately, and foster the creation of new products and services for additional revenue streams. That was the conclusion from ISG’s “2024 ISG Provider Lens global Generative AI Services” report.

Keep ReadingShow less
port of oakland port improvement plans

Port of Oakland to modernize wharves with $50 million grant

The Port of Oakland has been awarded $50 million from the U.S. Department of Transportation’s Maritime Administration (MARAD) to modernize wharves and terminal infrastructure at its Outer Harbor facility, the port said today.

Those upgrades would enable the Outer Harbor to accommodate Ultra Large Container Vessels (ULCVs), which are now a regular part of the shipping fleet calling on West Coast ports. Each of these ships has a handling capacity of up to 24,000 TEUs (20-foot containers) but are currently restricted at portions of Oakland’s Outer Harbor by aging wharves which were originally designed for smaller ships.

Keep ReadingShow less
screen display of GPS fleet tracking

Commercial fleets drawn to GPS fleet tracking, in-cab video

Commercial fleet operators are steadily increasing their use of GPS fleet tracking, in-cab video solutions, and predictive analytics, driven by rising costs, evolving regulations, and competitive pressures, according to an industry report from Verizon Connect.

Those conclusions come from the company’s fifth annual “Fleet Technology Trends Report,” conducted in partnership with Bobit Business Media, and based on responses from 543 fleet management professionals.

Keep ReadingShow less