{"id":4667,"date":"2026-01-14T06:00:00","date_gmt":"2026-01-14T14:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=4667"},"modified":"2026-01-11T22:12:47","modified_gmt":"2026-01-12T06:12:47","slug":"tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/","title":{"rendered":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat"},"content":{"rendered":"\n<p>When we\u2019re called in to investigate a cyber incident, most organisations focus on one thing \u2014 getting back online quickly. That\u2019s understandable because operations stop, customers must wait, and the pressure is immense. But what\u2019s often overlooked in the urgency of recovery is the initial entry point of the attacker.<\/p>\n\n\n\n<p>In nearly one-third of the European incidents Unit 42<sup>\u00ae<\/sup> investigated over the past year, the breach began inside an organisation\u2019s supply chain. These attacks exploit a supplier, a partner or a service provider to reach the real target. This finding, however, doesn\u2019t factor in that most of these attacks are never reported as supply-chain incidents because tracing the origin requires time and resources that few have. The result is a dangerous blind spot.&nbsp;<\/p>\n\n\n\n<p>Other data shows that the supply chain threats are rising fast, with estimates of a <a href=\"https:\/\/www.verizon.com\/business\/resources\/articles\/s\/what-the-2024-dbir-tells-us-about-enterprise-cybersecurity-strategy\/\">100% YoY increase<\/a>. And, they are appearing as the <a href=\"https:\/\/www.paloaltonetworks.co.uk\/resources\/research\/2025-incident-response-report\">no. 2 emerging<\/a> threat. The true scale is far greater than any reporting will show.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Weakest Link Principle in Action<\/h2>\n\n\n\n<p>Today\u2019s enterprises depend on vast digital ecosystems. Each one connects to hundreds, sometimes thousands, of third-party suppliers. Every connection \u2014 an API, a shared database or a remote maintenance tool \u2014 is a potential doorway.&nbsp;<\/p>\n\n\n\n<p>Attackers know this. They don\u2019t need to batter down a heavily defended front gate when a side door is wide open. Smaller suppliers often lack the layered defences or monitoring that large organisations regard as a minimum standard. A single compromise in a trusted vendor can cascade through the entire network.<\/p>\n\n\n\n<p>We\u2019ve seen this play out in striking ways. During a global sporting event, a compromised content provider allowed hackers to hijack commercial screens across a major European city, pushing propaganda at scale. In another case, attackers breached the CCTV infrastructure of a pharmaceutical company, creating remote access to sensitive R&amp;D facilities. And another attack was far more targeted and nefarious. The attackers hid a Trojan in a digital car sales flyer that reached embassy staff in Ukraine via an everyday notice board. Each one started with a trusted supplier and ended with a significant downstream breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why the Threat Is Accelerating<\/h2>\n\n\n\n<p>Several forces are converging to make supply-chain compromises the attack vector of choice.<\/p>\n\n\n\n<p>The first is economic asymmetry. The cost to launch an attack is far cheaper than the cost to defend against them. Breaching a small supplier with weaker defences is easier and costs an attacker little more than time and patience, while defending a global enterprise obviously requires massive investment. The payoff for this patience can be huge. It takes just one successful supplier breach to unlock access to multiple downstream targets.<\/p>\n\n\n\n<p>The second is AI acceleration. Threat actors now use AI-driven reconnaissance tools to scan the internet to map who connects to whom and identify potential supply chain weaknesses. With ransomware as a service and access brokers selling credentials on demand, the barrier to entry has never been lower.&nbsp;<\/p>\n\n\n\n<p>For example, such groups as Muddled Libra (also known as Scattered Spider) use these tools with devastating effect. In one incident we investigated, a business-process outsourcing firm faced five separate attacks in a single week. Each one attempted to exploit a different route through its partner network.<\/p>\n\n\n\n<p>Finally, digital overextension is multiplying the attack surface. Every new SaaS integration, data-sharing partnership or outsourced process adds complexity and dependency. As ecosystems grow, visibility diminishes, and unseen risk thrives in the shadows.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How a Supply Chain Attack Unfolds<\/h2>\n\n\n\n<p>The anatomy of these attacks is increasingly familiar. It begins with reconnaissance. Automated scanning is used to find outdated software, exposed credentials or misconfigured services in third-party systems. Once inside, the attacker studies the environment, looking for connections to higher-value organisations. The supplier is rarely the end goal, but rather the stepping stone.<\/p>\n\n\n\n<p>From there, the attacker moves laterally. They might use stolen credentials to access shared cloud storage or embed malicious code in a software update. Eventually, they reach a target that holds sensitive data or operational control. Extortion follows, often a threat to leak data, disrupt operations or report the breach to regulators to trigger fines and reputational damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who\u2019s Being Targeted?<\/h2>\n\n\n\n<p>The most frequent targets that we\u2019ve observed are in high-tech and financial services. These sectors handle valuable data and depend on an array of vendors. But they\u2019re not alone. Law firms and professional services providers, both rich in confidential client material, have become prime targets due to their connections to blue-chip enterprises. Luxury brands are also on the list, often attacked indirectly to reach the personal data of high-net-worth clients.<\/p>\n\n\n\n<p>Besides following the money, attackers are following connectivity. The more an organisation interacts with others, the more routes exist to reach it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Case for Cyber Altruism<\/h2>\n\n\n\n<p>Traditional security thinking stops at the enterprise boundary. We protect what we own and manage. But that approach no longer works when exposure extends across hundreds of suppliers.<\/p>\n\n\n\n<p>Unit 42 advocates for \u201ccyber altruism\u201d \u2014 the idea that larger organisations should extend enterprise-grade protection, tooling and expertise downstream to smaller partners. Cyber altruism is enlightened self-interest. Every weak link in your supply chain is a potential breach in your own.<\/p>\n\n\n\n<p>Cyber altruism means mapping dependencies, identifying weak links and sharing security. It might involve providing smaller vendors with access to secure file-transfer tools, threat-intelligence feeds or incident-response playbooks. Or, it can mean including minimum security standards in contracts or offering cofunded training. Anchor enterprises typically lead this work, since they have the most to lose if a partner is breached.<\/p>\n\n\n\n<p>When done well, the benefits are collective. Risk is reduced across the ecosystem, resilience improves and trust deepens. Organisations that take this approach are also likely to gain competitive advantage. Customers and regulators increasingly expect visible due diligence on supply chain security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Shared Responsibility<\/h2>\n\n\n\n<p>Supply chain security cannot rely on disclosure alone. Under-reporting will continue as long as investigations prioritise restoration over origin. But we can change what happens next.<\/p>\n\n\n\n<p>Leaders should start by asking three simple questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Do we know every digital dependency we have?<\/strong> Map suppliers, partners and service providers, however small.<\/li>\n\n\n\n<li><strong>Where are the weak links? <\/strong>Assess vulnerabilities and fix them before adversaries do.<\/li>\n\n\n\n<li><strong>How are we supporting our ecosystem?<\/strong> Extend safeguards and knowledge to those who need it most.<\/li>\n<\/ul>\n\n\n\n<p>The reality is that one weak link can compromise an entire ecosystem. Recognising that interdependence is the first step toward resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Looking Ahead<\/h2>\n\n\n\n<p>The growth of connected supply chains has transformed how business is done, but it has also created a perfect storm for attackers. Economic imbalance, rapid AI adoption and endless digital interconnections have tilted the field in their favour.<\/p>\n\n\n\n<p>Rebalancing it requires technology and demands collaboration, visibility and shared accountability. Cyber altruism captures that mindset \u2014 pragmatic, collective and focused on protecting everyone who depends on the chain.<\/p>\n\n\n\n<p>We can\u2019t fix what we can\u2019t see. But, once we look beyond the tip of the iceberg, we can start strengthening what lies beneath.<\/p>\n\n\n\n<p>Read the Unit 42 Global Incident Response Report <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/unit-42-incident-response-report-social-engineering-edition\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Supply chain threats are rising. Are you ready for what\u2019s next?<\/p>\n","protected":false},"author":1,"featured_media":4677,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,15],"tags":[],"coauthors":[194],"class_list":["post-4667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives<\/title>\n<meta name=\"description\" content=\"Supply chain threats are rising. Are you ready for what\u2019s next?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Supply chain threats are rising. Are you ready for what\u2019s next?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-14T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris George\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat\",\"datePublished\":\"2026-01-14T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\"},\"wordCount\":1182,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg\",\"articleSection\":[\"AI\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\",\"name\":\"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg\",\"datePublished\":\"2026-01-14T14:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"Supply chain threats are rising. Are you ready for what\u2019s next?\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives","description":"Supply chain threats are rising. Are you ready for what\u2019s next?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/","og_locale":"en_US","og_type":"article","og_title":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives","og_description":"Supply chain threats are rising. Are you ready for what\u2019s next?","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/","og_site_name":"Perspectives","article_published_time":"2026-01-14T14:00:00+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg","type":"image\/jpeg"}],"author":"Chris George","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat","datePublished":"2026-01-14T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/"},"wordCount":1182,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg","articleSection":["AI","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/","name":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg","datePublished":"2026-01-14T14:00:00+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"Supply chain threats are rising. Are you ready for what\u2019s next?","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/tip-of-the-iceberg-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/tip-of-the-iceberg-the-hidden-scale-of-europes-supply-chain-cyberthreat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Tip of the Iceberg: The Hidden Scale of Europe\u2019s Supply Chain Cyberthreat"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=4667"}],"version-history":[{"count":4,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4667\/revisions"}],"predecessor-version":[{"id":4696,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4667\/revisions\/4696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/4677"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=4667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=4667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=4667"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=4667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}