{"id":365484,"date":"2026-02-18T18:03:22","date_gmt":"2026-02-18T23:03:22","guid":{"rendered":"https:\/\/tech.co\/?p=365484"},"modified":"2026-02-19T11:53:30","modified_gmt":"2026-02-19T16:53:30","slug":"report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","status":"publish","type":"post","link":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","title":{"rendered":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n<\/p><div class=\"verdict-box inform-box\" data-eventcategory=\"verdictbox\" data-component=\"verdict-box\" data-total-positions=\"3\">\n\n <div class=\"verdict-box-wrap inform-box-wrap\">\n <h3 class=\"verdict-box-title\">Key Takeaways<\/h3>\n \n <div class=\"verdict-box-info\">\n<ul>\n<li><strong>One in four breaches today exploits a third-party vulnerability<\/strong> rather than a direct internal attack.<\/li>\n<li><strong>30% of cyber intrusions are through the use of valid credentials<\/strong>, often stolen in phishing attacks.<\/li>\n<li>In 2025, cyber attackers shifted away from &ldquo;frequent but contained&rdquo; events and toward <strong>fewer attacks with larger financial impacts<\/strong>.<\/li>\n<\/ul>\n<p>\n<\/p><\/div>\n <\/div>\n\n <div class=\"verdict-box-footer inform-box-buttons\">\n <div class=\"container\">\n <div class=\"row\">\n <\/div>\n <\/div>\n <\/div>\n\n<\/div>\n[vc_column_text css=&rdquo;&rdquo;]\n<p>Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity,&nbsp;according to a new threat report.<\/p>\n<p>Among the top threats in the new analysis are the vulnerabilities inherent to the digital supply chain, and the third-party suppliers that compose it. In fact, third-party software represents a 20% increase in risk over direct internal attacks.<\/p>\n<p>Meanwhile, <a href=\"https:\/\/tech.co\/news\/us-employees-use-ai-daily-work\"><strong>AI tools<\/strong><\/a> are behind a massive 80% of phishing events recorded worldwide in 2025. Here&rsquo;s what to know.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&rdquo;2\/3&Prime;][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>Moderate Risks Can Still Lead to a $100M Loss<\/h2>\n<p>The new analysis, titled &ldquo;<a href=\"https:\/\/resources.dataminr.com\/dataminr-for-cyber-defense\/dataminr-2026-cyber-threat-landscape-report\" target=\"_blank\" rel=\"noopener noreferrer\">2026 Cyber Threat Landscape Report<\/a>,&rdquo; emerged last week from risk intelligence company Dataminr.<\/p>\n<p>Last year alone, the company processed 6.3 million external threat alerts,&nbsp; 4.8 million vulnerability alerts, and 3.1 million digital risk alerts. The dangers of third-party vulnerabilities were one of their top takeaways.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&rdquo;1\/3&Prime;]<\/p><p>&nbsp;<\/p>\n<p style=\"text-align: center\"><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-333457\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/06\/18114043\/About-Techco-video.jpg\" alt=\"About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co Logo\" width=\"200\" height=\"200\"><\/a><strong>This just in! View<\/strong><br>\n<strong><a href=\"https:\/\/compare.tech.co\/software-deals-live\/\">the top business tech deals<\/a> for 2026 &#128104;&zwj;&#128187;<br>\n<\/strong><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-348272 aligncenter\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/09\/09122654\/ok-1.png\" alt=\"See the list button\" width=\"200\" height=\"85\"><\/a><\/p>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]\n<blockquote><p>&ldquo;One in four modern breaches now exploits a third-party vulnerability (CVE), escalating the risk magnitude by 20% compared to direct internal attacks. This &lsquo;Vendor Pivot&rsquo; is characterized by extreme velocity; 96% of these vulnerabilities are weaponized within the same calendar year of disclosure, frequently bypassing internal detection and resulting in twice the data impact per incident.&rdquo; -the report<\/p><\/blockquote>\n<p>In some cases, the risk of a CVE is moderate&hellip; but financial losses from the potential data breach or ransomware event&nbsp;&ldquo;could easily exceed $50M to $100M+.&rdquo;<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>AI-Powered Phishing Is Rising Concern<\/h2>\n<p>Other takeaways from the threat report?<\/p>\n<ul>\n<li><strong>Valid credentials, not break-ins<\/strong>: A big chunk (30%) of cyber intrusions now come through the use of <em>valid<\/em> credentials &mdash; attackers log in with stolen details rather than try to break in through a backdoor.<\/li>\n<li><strong>Phishing resilience<\/strong>: Phishing is still the biggest intrusion vector in 60% of cases.<\/li>\n<li><strong>Artificial intelligence powers phishing attacks<\/strong>: AI-supported phishing campaigns represented over 80% of observed social engineering activity around the globe in 2025.<\/li>\n<li><strong>Refusal to pay is trending<\/strong>: 63% of organizations opted <strong><a href=\"https:\/\/tech.co\/news\/businesses-pays-ransomware\">not to pay ransoms<\/a><\/strong>&nbsp;last year, an uptick up from 59% in 2024.<\/li>\n<li><strong>Fewer attacks but bigger impacts<\/strong>: &ldquo;From a financial loss perspective, 2025 marked a clear shift from frequent but contained cyber losses toward fewer events with materially larger financial and mission impact,&rdquo; says the report.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>AI and the Future of Cybersecurity<\/h2>\n<p>It&rsquo;s no wonder <strong><a href=\"https:\/\/tech.co\/news\/tighten-up-ai-governance-gartner-warns\">Gartner&rsquo;s recent cybersecurity predictions for 2026<\/a><\/strong> made sure to call for stronger governance and increased oversight of AI tools to reduce the potential security risks they pose.<\/p>\n<p>With usage of AI agents only set to increase in 2026, cybersecurity professionals are once again on the cutting edge of unprecedented security problems.<\/p>\n<p>Businesses can respond with increased training and more security tools. Plus, 94% of respondents in <a href=\"https:\/\/tech.co\/news\/experts-ai-drive-cybersecurity\"><strong>one recent survey<\/strong><\/a> say that AI can spearhead positive changes in cybersecurity in 2026.<\/p>\n<p>Still, with AI voices and video footage becoming more convincing by the day, phishing attacks will likely continue to grow as a problem.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Plus, AI-powered phishing campaigns represented over 80% of social engineering events in 2025.<\/p>\n","protected":false},"author":8412,"featured_media":360972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[49009,49301],"class_list":["post-365484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-artificial-intelligence","tag-cybersecurity-guides","col-12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co<\/title>\n<meta name=\"description\" content=\"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co\" \/>\n<meta property=\"og:description\" content=\"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\" \/>\n<meta property=\"og:site_name\" content=\"Tech.co\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T23:03:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-19T16:53:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Rowe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdamRRowe\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Rowe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#article\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\"},\"author\":{\"name\":\"Adam Rowe\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"headline\":\"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities\",\"datePublished\":\"2026-02-18T23:03:22+00:00\",\"dateModified\":\"2026-02-19T16:53:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\"},\"wordCount\":600,\"image\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity Guides\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/tech.co\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\",\"url\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\",\"name\":\"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg\",\"datePublished\":\"2026-02-18T23:03:22+00:00\",\"dateModified\":\"2026-02-19T16:53:30+00:00\",\"author\":{\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"description\":\"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.\",\"breadcrumb\":{\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage\",\"url\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg\",\"contentUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg\",\"width\":1920,\"height\":960,\"caption\":\"Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tech.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tech.co\/#website\",\"url\":\"https:\/\/tech.co\/\",\"name\":\"Tech.co\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tech.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\",\"name\":\"Adam Rowe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"caption\":\"Adam Rowe\"},\"description\":\"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.\",\"sameAs\":[\"https:\/\/x.com\/AdamRRowe\"],\"url\":\"https:\/\/tech.co\/author\/arrowe\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co","description":"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","og_locale":"en_US","og_type":"article","og_title":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co","og_description":"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.","og_url":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","og_site_name":"Tech.co","article_published_time":"2026-02-18T23:03:22+00:00","article_modified_time":"2026-02-19T16:53:30+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg","type":"image\/jpeg"}],"author":"Adam Rowe","twitter_card":"summary_large_image","twitter_creator":"@AdamRRowe","twitter_misc":{"Written by":"Adam Rowe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#article","isPartOf":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities"},"author":{"name":"Adam Rowe","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"headline":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities","datePublished":"2026-02-18T23:03:22+00:00","dateModified":"2026-02-19T16:53:30+00:00","mainEntityOfPage":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities"},"wordCount":600,"image":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg","keywords":["Artificial Intelligence","Cybersecurity Guides"],"articleSection":["News"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/tech.co\/#organization"}},{"@type":"WebPage","@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","url":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities","name":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities - Tech.co","isPartOf":{"@id":"https:\/\/tech.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage"},"image":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg","datePublished":"2026-02-18T23:03:22+00:00","dateModified":"2026-02-19T16:53:30+00:00","author":{"@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"description":"Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new report.","breadcrumb":{"@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#primaryimage","url":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg","contentUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/04\/14055207\/AdobeStock_267969101-1.jpeg","width":1920,"height":960,"caption":"Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/tech.co\/news\/report-1-in-4-data-breaches-exploit-third-party-vulnerabilities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tech.co\/"},{"@type":"ListItem","position":2,"name":"Report: 1 in 4 Data Breaches Exploit Third-Party Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/tech.co\/#website","url":"https:\/\/tech.co\/","name":"Tech.co","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tech.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292","name":"Adam Rowe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","caption":"Adam Rowe"},"description":"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.","sameAs":["https:\/\/x.com\/AdamRRowe"],"url":"https:\/\/tech.co\/author\/arrowe"}]}},"_links":{"self":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/365484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/users\/8412"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/comments?post=365484"}],"version-history":[{"count":0,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/365484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media\/360972"}],"wp:attachment":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media?parent=365484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/categories?post=365484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/tags?post=365484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}