Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Experts Warn of Global Breach Risk from Indian Suppliers
News

Experts Warn of Global Breach Risk from Indian Suppliers

Team-CWDBy Team-CWDSeptember 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Global supply chains could be at risk after a new report revealed a surprisingly high share of Indian vendors have suffered a third-party breach over the past year.

SecurityScorecard first identified 10 industries in which Indian businesses make key contributions to global supply chains, including semiconductors, electronics, pharmaceuticals and outsourcing. It then singled out 15 Indian companies which are among the top exporters or service providers for foreign businesses and consumers.

The resulting report, Third-Party Cyber Risks to Global Supply Chains: An Assessment of Key Indian Suppliers, found that 53% of Indian vendors experienced at least one third-party breach in the past year.

Outsourced IT operations and managed service providers accounted for 63% of all third-party breaches in the report. Separately, pharmaceutical firms accounted for 42% of publicly reported breaches and 38% of ransomware incidents studied.

Read more on breaches at Indian suppliers: Tata Technologies Hit by Ransomware Attack.

By “third-party breach,” the report means either breaches at these vendors which led to data/infrastructure compromise at one or more other organizations, or that a compromise at another organization exposed data/infrastructure at these vendors.

“In other words, it includes breaches in which the companies on our sample were both unwitting enablers, as well as those in which they were on the receiving end of third-party risk,” the report noted.

Each vendor was given a grade based on their scores across multiple security risk factors, including patching cadence, DNS health, IP reputation, and endpoint, network and app security.

Indian Vendors Show Mixed Cybersecurity Ratings

Almost 27% of Indian vendors were given an “F” cybersecurity rating, the largest share in any SecurityScorecard report to date. However, a quarter (25%) were awarded an “A,” illustrating that best practice does exist in certain organizations.

Network security issues, mismanaged certificates and poor patching were the most common reasons for low ratings.

“India is a cornerstone of the global digital economy,” said Ryan Sherstobitoff, field CTO at SecurityScorecard. “Our findings highlight both strong performance and areas where resilience must improve. Supply chain security is now an operational requirement.”

SecurityScorecard recommended that organizations:

  • Continuously monitor third- and fourth-party ecosystems for emerging threats
  • Prioritize certificate management and patching, which were the most common areas of weakness
  • Pay attention to IT and managed service providers, which are among the highest-risk vendor categories globally
  • Use cybersecurity ratings to guide procurement, vendor oversight and ongoing risk management



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
Next Article U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.