Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Threat Counter
45%

of breaches involve third parties

Third-Party Breaches
The Hidden Risk

Your security is only as strong as your weakest vendor. One compromised supplier can cascade across thousands of organizations, including yours.

45%

Breaches involving third parties

+78%

Increase in supply chain attacks (2023)

5,000+

Average vendors per enterprise

89%

Vendors with access to sensitive data

Attack Surface

Your vendors are your vulnerability

Cloud Providers

Shared infrastructure

When AWS, Azure, or Google Cloud has an incident, thousands of businesses are affected simultaneously. Your security is only as strong as your provider's.

Example: Microsoft Exchange Online breach exposed US government emails (2023)

Software Vendors

Trusted access

SaaS tools and enterprise software have deep access to your systems. A compromised vendor update can spread malware across all customers.

Example: SolarWinds attack affected 18,000+ organizations including Fortune 500

Service Providers

Data handling

Outsourced IT, payroll, and business services handle sensitive data. Their breach becomes your breach.

Example: Capita breach exposed data from hundreds of UK councils and NHS trusts

APIs & Integrations

Connection points

Every integration is a potential entry point. Attackers increasingly target the connections between systems rather than systems themselves.

Example: CircleCI breach compromised customer secrets and environment variables

The Cascade Effect

One breach, thousands of victims

Supply chain attacks are devastating because they multiply impact exponentially.

MOVEit / Progress Software

2023
2,600+ organizations

BBC, British Airways, Boots, Shell, and US government agencies were all affected by one file transfer tool vulnerability

SolarWinds

2020
18,000+ organizations

US Treasury, Commerce, Homeland Security, Microsoft, and Intel were compromised through malware embedded in trusted software updates

Kaseya VSA

2021
1,500+ businesses

REvil ransomware spread through IT management software to MSP customers worldwide

Okta

2022
366 customers

Identity provider breach gave attackers potential access to authentication for hundreds of enterprises

You can't control your vendors.
Control your data instead.

Third-party risk is unavoidable in connected systems. The only way to ensure your most critical data isn't exposed through a vendor breach is to keep it offline.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Protect your data from third-party failures

Find out how offline isolation keeps your most critical assets safe, even when your suppliers are compromised.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy