“

Dmitry Dzhugalik Author of news on Mezha.media. I write about what I actively admire, namely technology, games and cinema.
According to reports of cybersecurity experts, in 2024 the number of attacks on third -party suppliers of companies around the world doubled. In 2025, their number is likely to be even higher.
Such messages appeared just a few months after the attack on the British retailer Marks and Spencer, which occurred as a result of a security violation of one of the suppliers who had access to the company’s data. Last year, NHS England suffered a similar cyber threat due to the breakdown of Synnovis partner, which provided pathology services.
As a result of these attacks, hacker groups block the activities of victims on the Internet if they refuse to pay large ransom. Vice president Unit 42 in Europe, in the Middle East and Africa, Tim Eridge notes that cybercriminals find “weaknesses” in the security systems of suppliers to direct attacks on large corporate organizations.
“If you” break “a supplier who has access to many leading organizations that use or associated with his services, you will make reusable investment profit,” Eridge says.
In 2024, 7965 cyberattacks were carried out, of which about 30% were caused by third parties’ vulnerability-twice as much as 2023, when only 14.9% of 7268 attacks were similar. Possible entry points include software, support services, or other technological solutions, such as AI.
Experts point out that hacker groups from North Korea, which have increased both the number and complexity of attacks, are most of these activities.
Higher attacks forced the governments of different countries to take cybersecurity seriously. The NIS2 Directive was adopted in the EU, which intensified restrictions on supply chains, and the Britain has adopted a bill on cybersecurity that would be presented in Parliament at the end of September.
The US government has a softer position, but still has taken steps to strengthen cyber defense by third -party federal government suppliers.
”, – WRITE: mezha.media

Dmitry Dzhugalik Author of news on Mezha.media. I write about what I actively admire, namely technology, games and cinema.
According to reports of cybersecurity experts, in 2024 the number of attacks on third -party suppliers of companies around the world doubled. In 2025, their number is likely to be even higher.
Such messages appeared just a few months after the attack on the British retailer Marks and Spencer, which occurred as a result of a security violation of one of the suppliers who had access to the company’s data. Last year, NHS England suffered a similar cyber threat due to the breakdown of Synnovis partner, which provided pathology services.
As a result of these attacks, hacker groups block the activities of victims on the Internet if they refuse to pay large ransom. Vice president Unit 42 in Europe, in the Middle East and Africa, Tim Eridge notes that cybercriminals find “weaknesses” in the security systems of suppliers to direct attacks on large corporate organizations.
“If you” break “a supplier who has access to many leading organizations that use or associated with his services, you will make reusable investment profit,” Eridge says.
In 2024, 7965 cyberattacks were carried out, of which about 30% were caused by third parties’ vulnerability-twice as much as 2023, when only 14.9% of 7268 attacks were similar. Possible entry points include software, support services, or other technological solutions, such as AI.
Experts point out that hacker groups from North Korea, which have increased both the number and complexity of attacks, are most of these activities.
Higher attacks forced the governments of different countries to take cybersecurity seriously. The NIS2 Directive was adopted in the EU, which intensified restrictions on supply chains, and the Britain has adopted a bill on cybersecurity that would be presented in Parliament at the end of September.
The US government has a softer position, but still has taken steps to strengthen cyber defense by third -party federal government suppliers.