Open Ports, Default Credentials, and Supply Chain Risks (Domain 2)
Even the best-configured systems can fall victim to the most basic security oversights—like open ports and unchanged default passwords. In this episode, we focus on how these simple but dangerous misconfigurations continue to be exploited, providing easy access points for attackers using automated scanning tools. We also explore the broader risk posed by third-party vendors, suppliers, and managed service providers (MSPs) in the supply chain, where security hygiene may vary and trust can be misplaced. Compromises in upstream software libraries, firmware, or vendor APIs have led to devastating breaches, making supply chain visibility and verification a growing priority. Defenses include disabling unnecessary services, rotating credentials immediately, and performing rigorous vendor assessments to ensure secure practices throughout the chain. An attacker doesn’t always break down the front door—they may walk in through a forgotten backdoor left open by someone else.
