New Report Warns of 'Velocity Without Visibility' in Deepening Supply Chain Security Crisis

Supply Chain in Crisis: Exploits Now Arrive Before Companies Know They're Vulnerable

HIGH
May 21, 2026
4m read
Supply Chain AttackThreat IntelligenceVulnerability

Related Entities

Products & Tech

Other

Black KiteMistral AIUiPath

Full Report

Executive Summary

A May 2026 report from cybersecurity firm Black Kite, titled "Velocity Without Visibility," paints a stark picture of the modern supply chain security crisis. The core problem is that the speed of vulnerability disclosure and exploitation now outpaces the ability of most organizations to gain visibility into their own risk exposure. With a staggering 48,000 CVEs published in 2025, the time-to-exploit has effectively become negative for some critical flaws—exploits are weaponized and available at or even before public disclosure. The report argues that the key challenge for defenders is not the sheer number of vulnerabilities, but the lack of visibility to identify the small subset that are truly critical and actively targeted. This problem is being amplified by the increasing use of AI for both vulnerability discovery and by attackers targeting core software development infrastructure, as seen in recent compromises of TanStack, Mistral AI, and UiPath packages.

Threat Overview

The report identifies a fundamental paradigm shift: 'velocity without visibility.'

  • Velocity: The time between vulnerability disclosure and exploitation has collapsed. Attackers, aided by automation and shared intelligence, can weaponize a new CVE in hours or days, not weeks or months.
  • Visibility: Organizations struggle to see their own exposure. This includes not knowing which open-source components are in their applications (Software Bill of Materials - SBOM), which third-party services have access to their data, and which of the thousands of new CVEs actually pose a material risk to them.

The report highlights that of the 48,000 CVEs from 2025, only 58 were easily discoverable and exploitable using open-source intelligence (OSINT), suggesting that a highly focused approach is needed. However, finding these 'needles in the haystack' requires deep visibility into the software supply chain.

Technical Analysis

Attackers are shifting their focus 'left' to target the development process itself. Recent incidents involving TanStack, Mistral AI, and UiPath packages are prime examples of this trend. These attacks often involve techniques like:

  • T1554 - Compromised Software Supply Chain: Attackers compromise a popular software package or library. When developers include this package in their own applications, the malicious code is distributed to all of the application's users. This was seen in the attacks on npm and PyPI packages.
  • T1195.001 - Compromise Software Dependencies and Development Tools: This involves targeting the tools developers use, such as code repositories, build servers, or package managers. By compromising a single tool, an attacker can inject malicious code into multiple projects.
  • T1078 - Valid Accounts: Attackers steal the credentials of a legitimate software developer to publish malicious updates to a trusted software package.

The proliferation of AI is a double-edged sword. Defensive AI can help scan code and identify vulnerabilities at scale, but offensive AI can be used by attackers to find new zero-day vulnerabilities more quickly.

Impact Assessment

The business impact of this crisis is systemic. A single compromise in a widely used software component or developer tool can lead to a cascading failure, impacting thousands of downstream organizations. This creates a significant concentration of risk. The 'velocity without visibility' problem means that organizations are often in a reactive posture, only discovering they are vulnerable after they have already been compromised. This leads to costly incident response, data breaches, reputational damage, and loss of customer trust. The inability to quickly identify and remediate critical supply chain vulnerabilities is becoming a major business continuity risk.

Detection & Response

  • Software Bill of Materials (SBOM): The foundational step is to know what is in your software. Generate and maintain SBOMs for all developed and procured applications. This provides the necessary visibility to respond when a vulnerability is discovered in a specific component.
  • Vulnerability Scanning: Use Software Composition Analysis (SCA) tools to continuously scan your code repositories and artifacts for known vulnerabilities in open-source dependencies.
  • Behavioral Monitoring of Build Environments: Treat your build and CI/CD pipeline as critical infrastructure. Monitor for anomalous behavior, such as build processes making unexpected outbound network connections or accessing sensitive credentials.

Mitigation

  • Dependency Management: Curate a list of approved open-source components and versions. Use a private package repository or proxy to ensure developers are only using vetted dependencies. This is a form of D3FEND Executable Allowlisting (D3-EAL) applied to libraries.
  • Harden the CI/CD Pipeline: Secure the development pipeline by enforcing MFA for developer accounts, implementing least-privilege access to code repositories and build servers, and scanning all code and artifacts at each stage of the pipeline.
  • Principle of Least Privilege: Ensure that build processes and third-party tools have only the minimum permissions necessary to function. A build script for a front-end application should not have access to production database credentials.

Timeline of Events

1
May 21, 2026
This article was published

MITRE ATT&CK Mitigations

Digitally sign your own software and verify the signatures of third-party components to ensure integrity.

In the context of dependencies, this means curating and approving which libraries developers can use, preventing the introduction of risky or unknown packages.

Audit

M1047enterprise

Continuously audit and monitor the software supply chain using SBOMs and SCA tools to gain the necessary visibility.

D3FEND Defensive Countermeasures

To combat the 'velocity without visibility' crisis, organizations must gain insight into their software components. System File Analysis, in the form of Software Composition Analysis (SCA) and Software Bill of Materials (SBOM) generation, is the critical countermeasure. Implement automated SCA tools within your CI/CD pipeline. These tools should scan every commit and build to identify all open-source dependencies and their versions. This creates an SBOM, which is a formal inventory of your software ingredients. This SBOM should then be continuously monitored against vulnerability databases. When a new CVE is announced for a component like TanStack or a UiPath package, you can instantly query your SBOM repository to determine exactly which of your applications are affected, who owns them, and where they are deployed. This transforms the response from a weeks-long manual investigation into a minutes-long automated query, providing the visibility needed to match the velocity of modern threats.

Hardening the supply chain itself is crucial. This involves applying Application Configuration Hardening to the development and CI/CD environment. A key tactic is to use a private, curated artifact repository (like Artifactory or Nexus) as a proxy for all external dependencies. Configure developer environments and build servers to only pull packages from this internal repository. The security team is responsible for vetting new packages and versions before they are admitted into the private repository. This prevents developers from accidentally pulling a typosquatted or compromised package directly from a public registry like npm or PyPI. This 'quarantine' process creates a critical checkpoint, breaking the direct line from the public internet to your build process and providing a control point to enforce dependency policies and prevent the initial ingress of malicious code.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply ChainSBOMSCAVelocityVisibilityTanStackCI/CD Security

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.