Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label IT threat landscape. Show all posts

Digital Twins: Benefits and the Cybersecurity Risks They Bring

 

Digital twins—virtual digital counterparts of physical objects, people, or processes—are rapidly being adopted by organizations as tools for simulation, testing, and decision-making. The concept traces its roots to NASA’s physical replicas of spacecraft in the 1960s, but today’s digital twins have evolved into sophisticated frameworks that bridge physical and digital systems, offering the power to predict real-world outcomes and inform business strategy. 

David Shaw, Intuitus Corp. CEO and Digital Twin Consortium (DTC) working group co-chair, notes that these systems now do much more than simply mirror physical systems; they actively link both worlds, enabling predictive analytics at scale. 

Greg Porter, Principal Solutions Architect at Sev1Tech, describes digital twin technology as still emerging, but increasingly central to business innovation. Their key advantage lies in the ability to simulate future scenarios and outcomes without disrupting the actual physical assets, allowing companies to test changes, interventions, or potential failures in a risk-free environment.

Industry applications are diverse: in healthcare, digital twins can model the effects of new medications or surgical procedures before implementation, while other organizations use digital twins to map employee interactions with physical assets, providing insights into cybersecurity attack surfaces and operational efficiencies. The cost to implement these systems varies widely, from a few hundred dollars for basic models to multi-million-dollar deployments for complex, mission-critical infrastructures. 

However, while digital twins unlock new capabilities in prototyping, testing, and risk management, they also introduce significant cybersecurity risks. Porter warns that, particularly in “full-loop” digital twin environments—where data flows both from the physical system into the digital twin and back again—organizations open a new attack vector from the digital realm directly into physical assets. If the digital twin infrastructure is insecure, threat actors could manipulate data in ways that affect real-world systems, potentially leading to loss of control or catastrophic outcomes. 

Kayne McGladrey, CISO in residence at Hyperproof, highlights that intellectual property theft is another rising threat; access to a digital twin could allow attackers to reverse-engineer sensitive business processes or product designs, providing competitors or nation-state actors with a strategic advantage. In sectors such as aerospace, defense, and critical infrastructure, the consequences of such breaches could be both severe and far-reaching. 

Mitigation tips 

To secure digital twins, organizations must implement robust data controls, segmenting and monitoring digital twin environments to prevent lateral movement by attackers. McGladrey recommends adopting “classic cybersecurity” measures with some enhancements: deploying phishing-resistant multi-factor authentication, tightly controlling user access, and maintaining comprehensive activity logs to support forensic investigation if an incident occurs. These steps, he notes, are not overly complex but do require deliberate planning to ensure that the security of both digital and physical assets is maintained. 

As digital twin adoption accelerates, organizations must weigh their operational benefits against the new risks they introduce. By understanding the full scope of both opportunities and threats, and by embedding strong cybersecurity principles from the outset, businesses can harness digital twins’ transformative potential without exposing themselves to undue risk.

Software Supply Chain Cyberattacks Surge 25%: IT, Telecom, and Fintech Firms Most Targeted

 

Software supply chain attacks have been steadily climbing, with recent data pointing to a 25% surge in incidents. This rise underscores the increasing sophistication of threat actors in breaching the complex web of interconnected software, hardware, and service providers that make up today’s IT environments.

According to an analysis of Cyble data, the average number of software supply chain attacks rose from under 13 per month (February–September 2024) to over 16 per month (October 2024–May 2025). The most recent two months saw nearly 25 incidents on average, suggesting a potential doubling of attack volume if current patterns hold. Still, month-to-month fluctuations remain high—with a low of 6 attacks in January 2025 and a peak of 31 in April 2025.

The dataset, compiled from Cyble’s investigations and open-source intelligence (OSINT), is not exhaustive, as many incidents remain undisclosed or undetected.

From January to May 2025, Cyble documented 79 cyberattacks with supply chain implications. Of these, 63% (50 incidents) were aimed at IT, technology, and telecommunications companies—prime targets due to their downstream influence. A single exploited vulnerability in these sectors can have a cascading effect, as seen in the widespread CL0P ransomware breaches.

Supply chain-related incidents touched 22 out of 24 tracked sectors, sparing only the Mining and Real Estate industries. In non-tech verticals, attackers often breached through third-party vendors and industry-specific service providers.

Regionally, the U.S. led with 31 reported incidents, followed by Europe (27) and APAC (26)—with India (9) and Taiwan (4) among the most affected in the Asia-Pacific region. The Middle East and Africa recorded 10 incidents, including four each in the UAE and Israel.

Cyble also detailed 10 major incidents, such as:

  1. Everest Ransomware claiming an attack on a Swiss banking tech firm, with stolen login credentials to banking apps.
  2. Akira ransomware affecting an IT services arm of a global conglomerate, reportedly disrupting projects linked to government bodies.
  3. A DarkForums threat actor advertising 92 GB of data related to a satellite project for Indonesia and ASEAN countries.
  4. Hellcat ransomware breaching a China-based electronics firm, exfiltrating 166 GB including blueprints and financial records.
  5. DragonForce targeting a U.S. biometric tech firm and extracting over 200 GB of data.
  6. VanHelsing ransomware infiltrating a U.S. enterprise security company, compromising potentially sensitive BFSI sector data.
  7. A threat actor on Exploit offering admin-level access to an Indian fintech firm’s cloud systems.
  8. Crypto24 extortion group claiming a 3TB breach of a Singapore-based tech firm.
  9. Killsec hacking group compromising an Australian IT and telecom solutions provider, leaking critical configuration data.
  10. A DarkForums actor offering access to an Australian telecom company’s domain admin portal for $750.

“Protecting against software supply chain attacks is challenging because these partners and suppliers are, by nature, trusted,” Cyble noted.

To mitigate risks, experts recommend:
  • Network microsegmentation
  • Restrictive access controls and regular validation
  • Biometric and multi-factor authentication
  • Encrypted data at rest and in transit
  • Ransomware-resistant, air-gapped backups
  • Honeypots for early breach detection
  • API and cloud configuration hygiene
  • Proactive monitoring via SIEM, Active Directory, and DLP tools
  • Routine audits, scans, and pen testing

The most strategic defense, Cyble suggests, lies within the CI/CD pipeline. Organizations must vet vendors thoroughly, incorporate security mandates in contracts, and make cybersecurity a core purchasing criterion. Leveraging services like Cyble’s third-party risk intelligence can accelerate this process and promote stronger security compliance among suppliers.

As threat actors evolve, organizations must embrace a layered, proactive approach to software supply chain security—treating it not as an IT concern, but as a critical business imperative.