In — breach notifications, organizations identified a third-party service provider as the source of the breach rather than their own systems. Those notifications span — distinct vendors affecting — organizations. Search for any vendor to explore how a single upstream compromise ripples across sectors.