Healthcare disruption without direct breach.

Belgian hospitals impacted via third-party provider compromise
β€’ Patient portals offline
β€’ Data access disrupted
β€’ Vendor risk exposed
Third-party attack surface is expanding fast.

Source: https://www.escudodigital.com/en/cybersecurity/cyberattack-disrupts-online-services-belgian-hospitals.html

How are you mitigating vendor-based threats? πŸ‘‡
Follow @technadu

#InfoSec #CyberSecurity #ThirdPartyRisk

Taboola Exploits Banking Sessions to Route Users to Temu Tracking Endpoint

Imagine a single line of code secretly redirecting people logged into their bank accounts to a commercial tracking site - that's what happened when a bank unknowingly approved a Taboola pixel that sent users to a Temu tracking endpoint. This sneaky exploit slipped past security controls, leaving both the bank and…

https://osintsights.com/taboola-exploits-banking-sessions-to-route-users-to-temu-tracking-endpoint?utm_source=mastodon&utm_medium=social

#ThirdpartyRisk #SupplyChain #SessionHijacking #TrackingExploit #BankingSecurity

Taboola Exploits Banking Sessions to Route Users to Temu Tracking Endpoint

Discover how Taboola exploits banking sessions to route users to Temu tracking endpoints, learn the risks and take action to protect your online security now.

OSINTSights

Healthcare Sector Tackles Third-Party AI Security Gaps with New Guidance

The healthcare sector is taking a major step towards securing its AI-powered tools with new guidance from the Health Sector Coordinating Council (HSCC) that helps tackle the growing threat of third-party AI security gaps. This playbook is a timely response to the explosion of AI-related cyber risks from vendors, and…

https://osintsights.com/healthcare-sector-tackles-third-party-ai-security-gaps-with-new-guidance?utm_source=mastodon&utm_medium=social

#ThirdpartyRisk #ArtificialIntelligence #Healthcare #AiSecurity #VendorCyberRisk

Healthcare Sector Tackles Third-Party AI Security Gaps with New Guidance

Learn how healthcare tackles third-party AI security gaps with new guidance from HSCC to manage vendor cyber risk and protect patient data effectively now.

OSINTSights

McGraw Hill Breach Exposed by Salesforce Setup Flaw

A configuration error in Salesforce, a widely used customer relationship management platform, led to a data breach at McGraw Hill, exposing customer data and raising questions about vendor services and data stewardship. The incident highlights the importance of proper setup and management of third-party services to protect sensitive…

https://osintsights.com/mcgraw-hill-breach-exposed-by-salesforce-setup-flaw?utm_source=mastodon&utm_medium=social

#DataBreach #Salesforce #ThirdpartyRisk #EducationSector #ConfigurationError

McGraw Hill Breach Exposed by Salesforce Setup Flaw

McGraw Hill breach exposed by Salesforce setup flaw, learn how configuration errors can compromise customer data and take action now to secure your systems.

OSINTSights

πŸ” Cyber Tip: Know your vendors’ cybersecurity posture. Third party risk is real.

A weak partner can become your breach point. Vet security practices and require accountability.

https://zurl.co/qAPTn

#Zevonix #CyberSecurity #ThirdPartyRisk #DaytonaBeach

Meta paused work with a $10B AI data vendor after hackers poisoned an open-source Python library called LiteLLM and walked out with four terabytes of data. So, that's bad. And the worst part? The stolen data might include the actual training methodologies that Meta, OpenAI, Anthropic, and Google paid billions to develop. Think about what that means. You can't protect your crown jewels if they're sitting inside a vendor who's connected to your three biggest competitors, all sharing the same open-source tools, all exposed by the same 40-minute window on PyPI before anyone noticed.

🎯 The attack chain here is worth understanding: hackers compromised a security scanner called Trivy, used that access to get credentials for a LiteLLM maintainer, then published two malicious package versions that lasted less than an hour before removal. Forty minutes. That's all it took.

πŸ’Ό Mercor is not some sloppy startup. It's 22-year-old founders, $500M annualized revenue, and clients at the very top of the AI industry. Sophistication doesn't protect you from a poisoned dependency you never thought to audit.

πŸ” The question I'd be asking right now if I were a CISO at any of these labs isn't "were we breached." It's "how many vendors in our training pipeline are running LiteLLM, and did we even know?"

Most companies audit their own software. Almost nobody audits the software their vendors use to build the data they're buying.

https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk
#Cybersecurity #AIRisk #SupplyChainSecurity spc #security #privacy #cloud #infosec #ThirdPartyRisk

Hims & Hers breach via third-party vendor 🚨
Social engineering β†’ support system access β†’ customer data exposed
Vendor risk = growing attack surface

https://www.technadu.com/hims-hers-data-breach-exposes-customer-data-via-compromise-at-third-party-customer-support-provider/625064/

#Infosec #Cybersecurity #ThirdPartyRisk

Supply chain strike? 🚨
Crunchyroll breach claims β†’ 100GB data
Third-party access = entry point
Short dwell time, massive exfil
Are vendors your weakest link? πŸ‘‡

Source: https://www.technadu.com/crunchyroll-data-breach-exposes-customer-information-via-telus-reports-say/624143/

Follow TechNadu
#Infosec #DataBreach #ThirdPartyRisk

Third-party ecosystems are structurally exposed.
Black Kite’s 2026 report reframes supply chain cyber risk from β€œweakest link” theory to concentration dynamics.

Key systemic indicators:
β€’ 5.28 downstream victims per breach (2025 average)
β€’ 10-day median detection vs. 73-day median disclosure
β€’ 53%+ organizations with at least one critical vulnerability
β€’ 23%+ with corporate credentials exposed

Top 50 shared vendors:
– 70% KEV exposure
– 84% CVSS β‰₯ 8
– 62% stealer-log credential presence
– 52% breach history

Shared infrastructure nodes are now strategic attack surfaces.
Security teams must shift toward:
Dependency mapping
Concentration analytics
Active intelligence monitoring
Exposure propagation modeling
Is your organization modeling systemic fragility β€” or auditing in isolation?

Source: https://blackkite.com/press-releases/black-kites-2026-third-party-breach-report-identifies-risk-concentration-as-the-primary-catalyst-for-global-cascading-failures

Engage below.
Follow TechNadu for advanced infosec, vendor risk, and threat intelligence coverage.

#Infosec #ThirdPartyRisk #VendorSecurity #ThreatIntelligence #CISAKEV #CyberExposure #Ransomware #SupplyChainSecurity #SecurityEngineering #CyberResilience #RiskAnalytics

Third-party breach, 38M impacted, European e-commerce sector.
ManoMano disclosed unauthorized access linked to a subcontracted customer support provider. Exposed data reportedly includes PII and support communications.
Authorities notified: CNIL, ANSSI.
Passwords not reportedly accessed.
Subcontractor access revoked.

Key risk vectors:
– SaaS support platforms
– Vendor access governance
– Over-retention of ticketing data
– Centralized customer communication logs
– Supply chain attack surface expansion

This case reinforces that vendor monitoring must go beyond contractual clauses β€” continuous assessment, least privilege enforcement, data minimization strategies.

How mature is your third-party risk telemetry?
Engage below.

Source: https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/

Follow @technadu for high-signal infosec reporting.

Repost to amplify awareness across the security community.

#Infosec #ThirdPartyRisk #VendorSecurity #SupplyChainSecurity #DataBreach #GDPRCompliance #EcommerceSecurity #CyberRiskManagement #SecurityOperations #GRC