Third-Party Risk
Managing Supply-Chain Risk – Field-Tested Wins | RiskImmune
Recent cybersecurity breaches have exposed critical vulnerabilities in the supply chains of major corporations. This analysis delves into the risk managem…
By RiskImmune Team · 23 December 2025
Recent Breaches Expose Supply Chain Vulnerabilities In 2023, a series of high-profile data breaches targeting major corporations underscored the vulnerabilities inherent in supply chain management. Notably, the incidents involving SolarWinds and Kaseya revealed how third-party software providers can become vectors for cyberattacks, compromising the security of thousands of downstream clients. The implications of these breaches extend far beyond the immediate financial losses, raising questions about the robustness of existing risk management frameworks. What Went Wrong The SolarWinds breach, which came to light in December 2020, involved the compromise of the company’s Orion software platform, which was used by a multitude of public and private sector organizations. Cybercriminals exploited vulnerabilities within the software to gain unauthorized access to networks, resulting in a significant data breach affecting numerous government agencies and Fortune 500 companies. Technical missteps included a lack of adequate code review processes and insufficient monitoring of third-party software updates. SolarWinds failed to implement stringent security measures during the development and deployment of its software, allowing attackers to insert malicious code into legitimate updates. This oversight can be traced back to governance failures, where risk management protocols were either inadequate or not enforced rigorously. Similarly, the Kaseya incident in July 2021 revealed weaknesses in the company’s handling of its VSA software, which provides IT management solutions to Managed Service Providers (MSPs). Attackers leveraged vulnerabilities to deploy ransomware, affecting over 1,500 businesses worldwide. The lack of effective patch management and vulnerability assessments within Kaseya’s supply chain contributed to this breach. Furthermore, Kaseya’s failure to communicate effectively with its clients about the risks posed by unpatched software exacerbated the situation. Wh…