Cybersecurity vulnerabilities of third parties