{"id":25349,"date":"2022-09-28T18:44:17","date_gmt":"2022-09-28T18:44:17","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25349"},"modified":"2022-09-28T19:05:58","modified_gmt":"2022-09-28T19:05:58","slug":"supply-chain-hacks-lead-to-partner-pentesting","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/","title":{"rendered":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow"},"content":{"rendered":"\n<p>Cybercriminals learn quickly. In a couple of decades&#8217; time, they&#8217;ve gone from pretending to be Nigerian princes to compromising the entire <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\">software supply chain<\/a>, and every day brings news of a new attack technique or a clever variation on an old one.<\/p>\n\n\n\n<p>Incidents like those that rattled <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\">SolarWinds<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\">Kaseya<\/a> and their downstream customers changed the game. By slipping malicious code into software used by thousands of businesses as an essential part of the supply chain, the cybercriminal fraternity managed to simultaneously infect a great many users at one time, a feat of remarkable efficiency.<\/p>\n\n\n\n<p>One casualty of these supply chain attacks has been trust between businesses and their key vendors, suppliers, and even customers.<\/p>\n\n\n\n<p>Partner organizations, after all, may be reluctant \u2014 if unlikely \u2014 to admit to cybersecurity weaknesses. And they may not even be aware that they have them. Howard Taylor,&nbsp;CISO of Radware, goes so far as to call it the &#8220;death of trust.&#8221;<\/p>\n\n\n\n<p>\u201cSolarWinds drove the death of trust, as thousands of the company&#8217;s customers were compromised by one cyberattack when updates to its Orion software were hijacked,\u201d Taylor told <em>eSecurity Planet<\/em>. \u201cPeople were shocked to discover that a long-trusted product had been compromised, creating vulnerabilities that bypassed thousands of its customers&#8217; carefully built security.\u201d<\/p>\n\n\n\n<p>As a result, some are now taking extra precautions such as hiring specialized companies to conduct <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">penetration testing<\/a> audits on externally facing partner resources. The process may include an in-depth search for IP addresses and ports inside their networks that may be communicating with suspect hosts. In other cases, businesses may go as far as scanning the dark web looking for any leakage of sensitive information from partners.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">Top Pentesting Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>&#8216;Shadow Compliance&#8217;<\/strong><\/h2>\n\n\n\n<p>Some say there is nothing legally wrong with pentesting your business partners. But the mere presence of closet security testers secretly carrying out pentests on partner and customer internet-facing resources could have serious repercussions on relationships if discovered. Yet who can blame organizations for taking extra steps as they look for liabilities that might eventually compromise them? How can a partner truly say they are risk-free in this day and age?<\/p>\n\n\n\n<p>\u201cTesting entities run the pentests and present the results to service providers and businesses,\u201d said Taylor. \u201cAs they are guilty until proven innocent, they must address all the findings, including a myriad of false positives, that result from conducting tests without the full context of the environment.\u201d<\/p>\n\n\n\n<p>Taylor terms this &#8220;shadow compliance.&#8221; And he says that it poses two significant risks \u2014 negative impact on company reputation and lost productivity. Company reputation is not only of interest to current and potential customers, but it\u2019s also important to market analysts, lenders, and insurance companies.<\/p>\n\n\n\n<p>\u201cPoor cybersecurity reports can impact analyst recommendations and raise costs for loans and <a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\">cyber insurance<\/a>,\u201d said Taylor. \u201cProductivity is impacted when skilled IT and security staff must postpone planned tasks to swiftly respond to these reports.\u201d<\/p>\n\n\n\n<p>He suggested that businesses should take the advent of potential snooping and testing by their partners as a reason to redouble their own cybersecurity efforts. Continuous monitoring of their cybersecurity posture by an outside entity can lower risk in the long term. Taylor urges businesses to allocate budget to hire a technically competent partner to proactively provide results and assist with the remediation of issues before vendors, supply chain associates, and customers find out and report them to you.<\/p>\n\n\n\n<p>Automated testing tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\">breach and attack simulation (BAS)<\/a> could help too.<\/p>\n\n\n\n<p>\u201cAll organizations should know and understand their current physical and logical security, where the gaps are, where are areas for improvements, what new technologies, services, tools, process and people education are needed to improve,\u201d said Greg Schulz, an analyst with StorageIO Group.<\/p>\n\n\n\n<p>There is no advantage in publicizing the fact that you are doing your own pentesting, Schulz said, particularly what and how you&#8217;re testing, other than general assurances that you have taken steps to protect, preserve, secure, and ensure information services are served when, where and how needed. Schulz would prefer that companies secretly test and inspect the security of vendors, partners, and even large customers rather than going through the security motions for the sake of compliance.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Internal Threats Could Be Exposed<\/strong><\/h2>\n\n\n\n<p>The practice of snooping on vendors, partners, and customers may bring about a side benefit, said Schulz: Better detection of <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">insider threats<\/a>. Yes, pentesting and other forms of surveillance can help spot external threats. But that is where the bulk of attention is spent in cybersecurity. Relatively little time is given to insider-originated attacks or data exfiltration attempts.<\/p>\n\n\n\n<p>\u201cWhile outward internet-facing IT resources, services, apps, and data get headline news coverage and bring awareness to security vulnerabilities, what\u2019s commonplace yet off the media radar are threats that occur from within,\u201d said Schulz. \u201cEveryone \u2013 organizations, vendors, partners, solution providers, pundits, and the media \u2013 are tunnel vision-focused on only internet-facing attacks and attack surfaces. They may be missing, or vulnerable to, incidents that occur or originate from within.\u201d<\/p>\n\n\n\n<p>With organizations pentesting and checking up on each other, those extra eyes are more likely to expose the efforts of disgruntled employees, attempts at theft of intellectual property, theft of mailing lists, and other internally generated actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Potential Liabilities for Secret Pentesting<\/strong><\/h2>\n\n\n\n<p>But a professional pentester had a different take. Steve Kerns, President of SKernal Security Consulting, has been pentesting for over 16 years. He said he had heard of the likes of Microsoft and Google quietly doing pentesting on each other.<\/p>\n\n\n\n<p>\u201cI would not be surprised if others were doing it,\u201d he said. \u201cBut it could be dangerous to be pentesting other companies without their permission; you could be opening up your company&nbsp;to lawsuits.\u201d<\/p>\n\n\n\n<p>He always obtains permission before pentesting another company.<\/p>\n\n\n\n<p>\u201cI would suggest that companies ask partners and customers if they have had a pentest done on their internet-facing resources and what the results were, who did it (third party or internal) and when it was done,\u201d said Kerns. \u201cIf they want to verify it, they should ask for permission first.\u201d<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\">How Hackers Compromise the Software Supply Chain<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f598460ac-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f598460ac\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f598460ac\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f598460ac\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f598460ac\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f598460ac\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f598460ac\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals learn quickly. In a couple of decades&#8217; time, they&#8217;ve gone from pretending to be Nigerian princes to compromising the entire software supply chain, and every day brings news of a new attack technique or a clever variation on an old one. Incidents like those that rattled SolarWinds and Kaseya and their downstream customers changed [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":18347,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[3790,3414,31708,730,31944,30620,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,380,31775,392],"class_list":["post-25349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cybersecurity","tag-network-security","tag-pentesting","tag-security","tag-software-supply-chain","tag-third-party-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-policy-compliance","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-28T18:44:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-28T19:05:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow\",\"datePublished\":\"2022-09-28T18:44:17+00:00\",\"dateModified\":\"2022-09-28T19:05:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg\",\"keywords\":[\"cybersecurity\",\"network security\",\"pentesting\",\"security\",\"software supply chain\",\"third-party security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\",\"name\":\"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg\",\"datePublished\":\"2022-09-28T18:44:17+00:00\",\"dateModified\":\"2022-09-28T19:05:58+00:00\",\"description\":\"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Hacker at computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet","description":"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/","og_locale":"en_US","og_type":"article","og_title":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet","og_description":"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/","og_site_name":"eSecurity Planet","article_published_time":"2022-09-28T18:44:17+00:00","article_modified_time":"2022-09-28T19:05:58+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg","type":"image\/jpeg"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow","datePublished":"2022-09-28T18:44:17+00:00","dateModified":"2022-09-28T19:05:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg","keywords":["cybersecurity","network security","pentesting","security","software supply chain","third-party security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/","url":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/","name":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg","datePublished":"2022-09-28T18:44:17+00:00","dateModified":"2022-09-28T19:05:58+00:00","description":"Software supply chain and third-party risks have reached a point where business partners are secretly pentesting each other.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Hacker-e1666979312899.jpg","width":1200,"height":800,"caption":"Hacker at computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/supply-chain-hacks-lead-to-partner-pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Businesses Secretly Pentest Partners as Supply Chain\u00a0Fears\u00a0Grow"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25349"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25349"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25349\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18347"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25349"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25349"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25349"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}