Vulnerabilities & CVEs

Supply Chain Security: Too Many Bugs, Too Little Sight

Forget patching; the sheer volume of software flaws means traditional defenses are already obsolete. The real danger lies in not knowing what’s actually lurking in your digital supply chain.

Supply Chain Chaos: Visibility Lag Means Chaos for You — Threat Digest

Key Takeaways

  • Over 48,000 CVEs were published in 2025, a number expected to grow.
  • Time to exploitation is now negative, meaning attacks occur before patches are available.
  • Only a small fraction of vulnerabilities (58 out of thousands) are easily discoverable and pose a genuine threat to enterprise supply chains.
  • AI is accelerating vulnerability discovery and the introduction of new software weaknesses.
  • Agentic AI tools increase exposure by granting broad access, often without IT awareness.

This isn’t just a cybersecurity problem anymore. It’s a ticking clock for every business, and by extension, for you, the end user whose data or services rely on that fragile digital chain. The news emerging from Black Kite’s 2026 Supply Chain Vulnerability Report isn’t about a new hack; it’s about a fundamental breakdown in our ability to protect ourselves, a situation where the sheer velocity of new threats blindsides us before we even know they exist.

Think about it: over 48,000 new vulnerabilities, or CVEs, were cataloged last year alone. That’s an industrial-scale deluge. But the truly chilling statistic isn’t the number of bugs; it’s the timeframe. Exploitation is now routinely happening before a patch is even released. We’re not just behind the curve; we’re effectively living in a post-patch reality. Mandiant’s M-Trends report, echoing Black Kite, states the mean time to exploit vulnerabilities has dropped to an estimated -7 days. Negative seven days. It’s a mind-bender, and frankly, a terrifying one.

So, what does this velocity without visibility actually mean for the average person? It means that the software you use, the apps on your phone, the services you stream, even the infrastructure powering your local utilities, are all far more exposed than anyone is willing to admit. It means that a vulnerability discovered today could have already been exploited yesterday by actors you’ll never even see. You’re not the target; you’re collateral damage in a game of digital whack-a-mole where the moles multiply faster than you can find them.

Is Patching Still a Thing?

This astronomical velocity of new flaws, coupled with the shrinking window for exploitation, renders traditional security models — primarily based on identifying and patching vulnerabilities — almost quaint. Black Kite’s research highlights this starkly: out of over 1,000 high-priority CVEs they analyzed, only a mere 58 were easily discoverable by attackers using open-source intelligence (OSINT). This isn’t a small oversight; it’s the crux of the visibility problem. If attackers can find critical flaws faster than defenders can even identify them, the game is inherently rigged.

And here’s where it gets even murkier. The report points to Artificial Intelligence as a significant accelerant for this crisis. Not only will frontier AI models likely discover more vulnerabilities in 2026, but the rapid proliferation of easily coded new applications, often fueled by AI itself, introduces more potential weaknesses. On top of that, the increased frequency of software updates, potentially influenced by AI-driven development cycles, might inadvertently embed more malicious code, like vulnerable npm packages, waiting for their moment.

Jeffrey Wheatman, SVP and cyber risk strategist at Black Kite, nails a key point: the rise of agentic AI tools. These aren’t just tools that help; they’re systems granted authorization, authentication, and access to your infrastructure. “I think much of the agentic growth we’re seeing is leading to additional exposures, because these tools are granted authorization, authentication, and access,” Wheatman observes. This amplifies the visibility problem exponentially. These agentic systems can operate in the shadows, hidden within downloaded web apps or quietly introduced through what’s often called ‘shadow AI’—systems that IT and security teams are completely unaware of.

Can AI Save Us From AI?

Wheatman offers a sliver of hope, suggesting that defensive AI could potentially assist. But this introduces a new, terrifying paradox: will the increasing velocity of threats force an over-reliance on completely autonomous defensive AI before it’s truly ready? The CrowdStrike incident, where a faulty configuration update to their Falcon Sensor caused widespread Windows system crashes for millions, serves as a stark reminder. While the immediate reaction might be to question automated updates, Wheatman points out that not updating signatures and definitions presents a significantly higher risk.

“The big question I heard was, ‘Should we turn off automated updates?’ because that is what caused that problem. The decision I heard is that those automatic updates, while they do lead to some risk, not updating signatures, those definitions, that discovery, that identification capability, is a significantly higher risk.”

This isn’t a one-size-fits-all answer. A bank’s trading system might demand a human override before an autonomous system initiates a shutdown, unlike a payroll system, where downtime costs might be less catastrophic hourly. The inherent risk calculation shifts dramatically depending on the criticality of the system. The core issue remains: how do you gain visibility into the vast, interconnected digital supply chain when the attack surface is constantly expanding, and the tools used to build it are themselves introducing new, hidden attack vectors?

My unique insight here? We’re witnessing not just a cybersecurity crisis, but an observability crisis layered onto critical infrastructure. For years, we’ve focused on detection and prevention. Now, the sheer scale and speed demand a radical shift towards understanding the entire attack surface in real-time. This isn’t about more firewalls; it’s about a foundational rethinking of how we map and monitor the digital components we depend on, a digital cartography that must be constantly updated and fundamentally more transparent.

**


🧬 Related Insights

Frequently Asked Questions**

What does ‘velocity without visibility’ mean for supply chain security? It means new software vulnerabilities are discovered too quickly for businesses to patch them effectively, and they lack the insight to know which ones are truly dangerous within their specific supply chain, making them highly vulnerable to attack.

Is AI making supply chain security worse? Yes, AI is a double-edged sword. While it can help discover vulnerabilities faster, it also enables attackers to find and exploit them more quickly, and agentic AI tools can introduce unseen risks that bypass traditional security measures.

What’s the solution to this crisis? The report suggests that improved ‘visibility’ into which of the numerous vulnerabilities pose genuine, discoverable, and exploitable threats to an enterprise’s supply chain is key to managing the ‘velocity’ of new threats.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What does 'velocity without visibility' mean for supply chain security?
It means new software vulnerabilities are discovered too quickly for businesses to patch them effectively, and they lack the insight to know which ones are truly dangerous within their specific supply chain, making them highly vulnerable to attack.
Is AI making supply chain security worse?
Yes, AI is a double-edged sword. While it can help discover vulnerabilities faster, it also enables attackers to find and exploit them more quickly, and agentic AI tools can introduce unseen risks that bypass traditional security measures.
What's the solution to this crisis?
The report suggests that improved 'visibility' into which of the numerous vulnerabilities pose genuine, discoverable, and exploitable threats to an enterprise's supply chain is key to managing the 'velocity' of new threats.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.