We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • INDUSTRY PRESS ROOM
  • ABOUT
  • CONTACT
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
Home » Report: E-mail vulnerabilities threaten supply chains

Report: E-mail vulnerabilities threaten supply chains

58% of organizations experienced an attempted supply chain attack in the past year, and poor e-mail security may be to blame, cybersecurity firm data show.

banner-5217685_640.jpg
August 4, 2021
DC Velocity Staff
No Comments
Nearly 60% of organizations have experienced an attempted supply chain attack in the past year, and e-mail vulnerabilities are a prime route to damage, according to data from Waltham, Mass.-based e-mail and cybersecurity firm GreatHorn.

The firm's Threat Intelligence Team released data showing that one of the most prominent techniques used in supply chain attacks is a form of man-in-the-middle (MitM) attack, in which an attacker compromises login credentials to leverage legitimate e-mail communication between parties in order to carry out their supply chain attack. Known as Vendor Email Compromise (VEC), the method allows attackers to log into a user’s e-mail so they can pose as that user and leverage trusted relationships in the user’s supply chain to take advantage of existing e-mail threads, or data, the company said.

“Given the quantity of workers remaining in a remote capacity, and the increase in phishing attacks that lead to malicious sites that compromise credentials, an organization’s supply chain has become a significant target for cybercriminals,” according to GreatHorn’s research on defending against vendor e-mail compromise. “With 3.7% of all e-mails containing potentially malicious links that bypass native e-mail security controls, and 41% of organizations stating that users click on malicious links daily, identifying links that attempt to harvest credentials is the first step for organizations in securing and protecting their users from account takeovers.”

To help prevent attacks, the research shows companies should augment or replace traditional e-mail security approaches with more sophisticated techniques; those include advanced computer vision programs that can analyze suspicious links and prevent employees from accessing password-stealing accounts, as well as biometric authentication programs that can recognize a user’s unique typing patterns such as keystroke speed, pressure, timing, and more.

“Attackers will continue to launch continuous attacks against supply chain partners, gaining access to supplier systems, including e-mail. Identifying spoofed vendors/individuals that can send malicious links and compromised partner accounts calls for advanced e-mail security techniques,” according to the company. “By augmenting or replacing traditional e-mail security approaches with more sophisticated capabilities, organizations can detect and mitigate the risk of supply chain attacks.”
KEYWORDS GreatHorn

Recent Articles by DC Velocity Staff

Cargo imports forecast to sink near three-year low in February

Air cargo demand slumped in 2022 after “extraordinary” levels in 2021

Logistics gives back: February 2023

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • Schneider welcomes first battery-electric truck

  • Fred Smith is not worried about Amazon

  • RJW LOGISTICS GROUP EXPANDS RETAIL LOGISTICS OPERATION TO DALLAS

  • Researchers: Ships can look to Mother Nature for energy-saving ideas

  • Maersk deploys indoor drones for warehouse inventory counts

Now Playing on DCV-TV

C8c3bc6b a91d 4181 a18f 35f288257630

ACPaQ: Fast and reliable automated mixed case palletizer

DCV-TV 4: Viewer Contributed
Fully Automated Mixed Case Palletizing ACPaQ is a universally applicable solution for fully automated order picking of mixed case pallets based on customers‘ requirements. Its software allows you to customize the palletizing order to increase efficiency during in-store replenishment. The mixed case palletizer...

FEATURED WHITE PAPERS

  • The five best applications for robotic lift trucks in warehouse environments

  • Fulfillment Facility Improved Efficiencies by 4x

  • 3PLs: Complete Orders Faster with Flexible Automation

  • Reusable Packaging for the New Wave of Supply Chain Automation

View More

Subscribe to DC Velocity Magazine

GET YOUR FREE SUBSCRIPTION
  • SUBSCRIBE
  • NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2023. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing