This document discusses software supply chain attacks in 2018 and compares predictions to reality. It describes incidents involving compromised updates to the MediaGet torrent application, a PDF editor app, and a remote support solutions provider. These attacks show how supply chains can be exploited at multiple levels, from compromising a software vendor to compromising another vendor that the first vendor relies on. The document also discusses attacks on Linux repositories, WordPress plugins, NPM modules, and Docker images. It concludes that software supply chain attacks remain a trend, have expanded beyond binaries to cloud environments, and are now used by cybercriminals in addition to nation-states. Detection across diverse software supply chains remains a challenge.