January 22, 2026, brought the escalating threat of digital supply chain attacks into sharp focus. A new report from Black Kite highlighted the significant cyber exposure within the retail and wholesale industries due to their complex and interconnected supplier ecosystems. This warning was amplified by the launch of a new end-to-end SaaS supply chain security solution from Obsidian Security, designed to address the growing risk of SaaS-to-SaaS compromises. These events illustrate a critical shift in the threat landscape, where attackers are increasingly targeting trusted relationships (T1199 - Trusted Relationship) between organizations and between their cloud applications. The modern, distributed enterprise, reliant on a web of third-party vendors and integrated SaaS apps, faces a new class of systemic risk that requires a new approach to security.
The digital supply chain threat manifests in two primary ways discussed today:
Vendor-Based Attacks: As detailed in the Black Kite report, attackers compromise a smaller, less secure third-party supplier to gain access to a larger, primary target. This is particularly effective in industries like manufacturing and tech, where sensitive intellectual property (CAD models, firmware designs) is shared with contractors. A ransomware group is reportedly exploiting this vector by compromising a supplier to steal and ransom proprietary designs from major tech companies.
SaaS-to-SaaS Attacks: Modern businesses rely on dozens or hundreds of interconnected SaaS applications (e.g., Salesforce, Slack, Microsoft 365). These applications are often granted broad API permissions to access data in one another. As Obsidian Security notes, an attacker who compromises one SaaS application can use its permissions to pivot and attack every other application it's connected to. The Salesloft-Drift incident, which affected over 700 organizations, is a prime example of this cascading risk.
Organizations must evolve their risk management programs to account for this new threat surface:
Resource Access Pattern Analysis.Extend vulnerability and security posture management to include third-party suppliers and integrated SaaS applications.
To combat SaaS supply chain attacks, organizations must analyze the resource access patterns of their integrated applications. This involves using a SaaS Security Posture Management (SSPM) tool to ingest audit logs from all critical SaaS platforms (e.g., Microsoft 365, Salesforce, Slack). The tool should baseline the normal API activity of each integration—what data it typically accesses, how much, and when. Alerts should be configured for significant deviations, such as a marketing automation tool suddenly attempting to access financial data in an ERP system, or a CRM integration exfiltrating the entire contact database. This behavioral analysis is key to spotting a compromised application being abused by an attacker.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats