SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSoftware supply chain attacks are surging to unprecedented levels. In 2025, such attacks doubled compared to the previous year, now accounting for roughly 30% of all breaches. Threat actors are exploiting trusted vendor relationships as an entry point–effectively poisoning the well upstream to compromise countless downstream customers.
A stark example occurred in September 2025, when a single npm attack injected malware into 18 widely used packages (totaling 2.6 billion weekly downloads). This incident underscored how a “weakest link” in the software supply chain can jeopardize thousands of organizations overnight.
High-value industries, such as financial services feel this pain acutely: the modern bank’s digital ecosystem interweaves hundreds of third-party providers, creating a complex web that is nearly impossible to map fully. Attackers have noticed. By compromising smaller suppliers or open-source components with lax security, they bypass hardened perimeters and ride the trust you place in your vendors straight into your network.
The result? Breaches that are costlier and longer-lasting than traditional attacks—the average breach already costs $4.44M, and supply chain incidents exceed even that—with devastating operational and reputational fallout for victim organizations.


Shilpi Mittal is a cybersecurity leader with over 13 years of experience driving enterprise application and cloud security. She leads large-scale initiatives that strengthen secrets management, application security, and API protection across hybrid and multi-cloud environments.
Read more about Shilpi Mittal













