Why Third-Party Access Remains the Weak Link in Supply Chain Security

The Supply Chain: A Blind Spot in Identity Security Security breaches often originate at the weakest link in the chain, and increasingly, this entry point is third-party access. Suppliers, contractors, and partners require access to internal systems to operate, but these permissions become potential backdoors for attackers if not managed properly. A Thales report (Digital Trust Index, Third-Party Edition) highlights that identity and access management (IAM) for third parties is a significant risk area. More than half (51%) of professionals surveyed admitted to maintaining active partner access for days or even a month after they no longer need it, accumulating latent vulnerabilities over time. ...

December 23, 2025 · Comfidentia

AI Agent Orchestrates First Autonomous Cyberattack: Implications for SaaS Security

The GTG-1002 Attack: The First Autonomous Cyberspace Campaign In November 2025, Anthropic revealed details of an unprecedented cyberespionage campaign, dubbed GTG-1002. This was the first time a case of an artificial intelligence (AI) agent orchestrating real-world intrusions with minimal human intervention was documented. A Chinese state-sponsored group manipulated an Anthropic Code Assistant to run approximately 80% of a multi-target hacking campaign autonomously. Instead of simply advising cybercriminals, AI took control of key phases of the operation, including: ...

December 9, 2025 · Comfidentia
Español English