The software supply chain is becoming the new battleground. Trust, once a cornerstone of open-source, is now under scrutiny. Developers need to exercise caution, vetting each package, no matter how reputable the source might seem.
Software supply chain attacks have spiked significantly year-over-year. Sonatype logged over 245,032 malicious packages in open source projects available to public download in 2023, double the number seen from 2019 to 2022. In total, one in eight open source downloads poses a risk.
Dealing with web supply chain attacks requires an in-depth look at third-party code usage. Third-party code is embedded in the core fabric of web development and is still one of the most valuable assets for competitive product development.
Software supply chain attacks will continue to be successful as long as the chasm between software development teams and info security teams persists. Until these two departments agree on common goals, attacks targeting software vulnerabilities will continue to cause havoc.
ENISA says software supply chain attacks will quadruple in 2021, causing widespread impact as threat actors deploy more sophisticated techniques making strong cyber defenses ineffective.
Federal agencies NIST and CISA issued guidelines to defend organizations and vendors against acquiring or distributing programs compromised through software supply chain attacks.