Skip to content
Search AI Powered

Latest Stories

Report: E-mail vulnerabilities threaten supply chains

58% of organizations experienced an attempted supply chain attack in the past year, and poor e-mail security may be to blame, cybersecurity firm data show.

banner-5217685_640.jpg

Nearly 60% of organizations have experienced an attempted supply chain attack in the past year, and e-mail vulnerabilities are a prime route to damage, according to data from Waltham, Mass.-based e-mail and cybersecurity firm GreatHorn.


The firm's Threat Intelligence Team released data showing that one of the most prominent techniques used in supply chain attacks is a form of man-in-the-middle (MitM) attack, in which an attacker compromises login credentials to leverage legitimate e-mail communication between parties in order to carry out their supply chain attack. Known as Vendor Email Compromise (VEC), the method allows attackers to log into a user’s e-mail so they can pose as that user and leverage trusted relationships in the user’s supply chain to take advantage of existing e-mail threads, or data, the company said.

“Given the quantity of workers remaining in a remote capacity, and the increase in phishing attacks that lead to malicious sites that compromise credentials, an organization’s supply chain has become a significant target for cybercriminals,” according to GreatHorn’s research on defending against vendor e-mail compromise. “With 3.7% of all e-mails containing potentially malicious links that bypass native e-mail security controls, and 41% of organizations stating that users click on malicious links daily, identifying links that attempt to harvest credentials is the first step for organizations in securing and protecting their users from account takeovers.”

To help prevent attacks, the research shows companies should augment or replace traditional e-mail security approaches with more sophisticated techniques; those include advanced computer vision programs that can analyze suspicious links and prevent employees from accessing password-stealing accounts, as well as biometric authentication programs that can recognize a user’s unique typing patterns such as keystroke speed, pressure, timing, and more.

“Attackers will continue to launch continuous attacks against supply chain partners, gaining access to supplier systems, including e-mail. Identifying spoofed vendors/individuals that can send malicious links and compromised partner accounts calls for advanced e-mail security techniques,” according to the company. “By augmenting or replacing traditional e-mail security approaches with more sophisticated capabilities, organizations can detect and mitigate the risk of supply chain attacks.”

The Latest

More Stories

AI sensors on manufacturing machine

AI firm Augury banks $75 million in fresh VC

The New York-based industrial artificial intelligence (AI) provider Augury has raised $75 million for its process optimization tools for manufacturers, in a deal that values the company at more than $1 billion, the firm said today.

According to Augury, its goal is deliver a new generation of AI solutions that provide the accuracy and reliability manufacturers need to make AI a trusted partner in every phase of the manufacturing process.

Keep ReadingShow less

Featured

AMR robots in a warehouse

Indian AMR firm Anscer expands to U.S. with new VC funding

The Indian warehouse robotics provider Anscer has landed new funding and is expanding into the U.S. with a new regional headquarters in Austin, Texas.

Bangalore-based Anscer had recently announced new financial backing from early-stage focused venture capital firm InfoEdge Ventures.

Keep ReadingShow less
Report: 65% of consumers made holiday returns this year

Report: 65% of consumers made holiday returns this year

Supply chains continue to deal with a growing volume of returns following the holiday peak season, and 2024 was no exception. Recent survey data from product information management technology company Akeneo showed that 65% of shoppers made holiday returns this year, with most reporting that their experience played a large role in their reason for doing so.

The survey—which included information from more than 1,000 U.S. consumers gathered in January—provides insight into the main reasons consumers return products, generational differences in return and online shopping behaviors, and the steadily growing influence that sustainability has on consumers.

Keep ReadingShow less

Automation delivers results for high-end designer

When you get the chance to automate your distribution center, take it.

That's exactly what leaders at interior design house Thibaut Design did when they relocated operations from two New Jersey distribution centers (DCs) into a single facility in Charlotte, North Carolina, in 2019. Moving to an "empty shell of a building," as Thibaut's Michael Fechter describes it, was the perfect time to switch from a manual picking system to an automated one—in this case, one that would be driven by voice-directed technology.

Keep ReadingShow less

In search of the right WMS

IT projects can be daunting, especially when the project involves upgrading a warehouse management system (WMS) to support an expansive network of warehousing and logistics facilities. Global third-party logistics service provider (3PL) CJ Logistics experienced this first-hand recently, embarking on a WMS selection process that would both upgrade performance and enhance security for its U.S. business network.

The company was operating on three different platforms across more than 35 warehouse facilities and wanted to pare that down to help standardize operations, optimize costs, and make it easier to scale the business, according to CIO Sean Moore.

Keep ReadingShow less