Resources




You have been granted access to this resource on an individual basis. Access credentials are not to be shared.



Our team of supply chain experts and researchers is dedicated to maintaining an up-to-date and valuable resource on supply chain attacks and exploits. While not exhaustive, this list offers a broad overview of the diverse attack vectors that impact the global ICT supply chain. We aim to provide insights that help you better understand the evolving landscape of cyber threats and vulnerabilities.



Please note that all information published here is derived from publicly available sources, including security research and investigative journalism. None of the content is classified or commercially sensitive; it remains entirely within the public domain.



PDFs have been captured and are periodically updated to provide a record in the event that the original source is removed.




  1. Mind the (air) gap: GoldenJackal gooses government guardrails

    Original Source: eset.com

  2. Israel’s Pager Attacks Have Changed the World

    Original Source: nytimes.com

  3. Phoenix UEFI vulnerability impacts hundreds of Intel PC models

    Original Source: bleepingcomputer.com

  4. The risks associated with Industrial IoT (Internet of Things)

    Original Source: archonsecure.com

  5. Ecuadorian TV presenter wounded by bomb disguised as USB stick

    Original Source: theguardian.com

  6. QCT Servers Affected by ‘Pantsdown’ BMC Vulnerability

    Original Source: securityweek.com

  7. Takeover risk to hundreds of IoT devices

    Original Source: portswigger.net

  8. Toyota production to resume after supply chain attack

    Original Source: computerweekly.com

  9. Supply chain attacks are on the rise

    Original Source: cpomagazine.com

  10. Jumping the air gap: 15 years of nation-state effort

    Original Source: eset.com

  11. Decade-long vulnerability in multiple routers could allow network compromise

    Original Source: medium.com/tenable-techblog

  12. Realtek flaw exposes dozens of brands to supply chain attacks

    Original Source: zdnet.com

  13. The Long Hack: How China Exploited a U.S. Tech Supplier

    Original Source: bloomberg.com

  14. BBC NEWS Eric Schmidt: Huawei has engaged in unacceptable practices

    Original Source: bbc.com

  15. MITRE ATT&CK: Supply chain compromise

    Original Source: infosecinstitute.com

  16. Every Part of the Supply Chain Can Be Attacked

    Original Source: nytimes.com

  17. Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains

    Original Source: theintercept.com

  18. The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

    Original Source: bloomberg.com

  19. On DoD warning about Lenovo

    Original Source: executivegov.com

  20. Researchers crack open unusually advanced malware that hid for 5 years

    Original Source: arstechnica.com

  21. Hackers Remotely Kill a Jeep on the Highway—With Me in It

    Original Source: wired.com

  22. Building reliable SMM backdoor for UEFI based platforms

    Original Source: blog.cr4.sh

  23. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

    Original Source: arstechnica.com

  24. A undetectable Hardware Trojan is reality

    Original Source: securityaffairs.co

  25. Spy agencies ban on Lenovo PCs due to backdoor vulnerabilities

    Original Source: securityaffairs.co

  26. Rakshasa: The hardware backdoor that China could embed in every computer

    Original Source: extremetech.com

  27. Intellipedia - Air Gapped Network Threats

    Original Source: theintercept.com

  28. NSA/CSS target exploitation (TAREX) classification guide

    Original Source: theintercept.com

  29. Can DARPA Fix the Cybersecurity ‘Problem From Hell?’

    Original Source: wired.com

  30. Stealthy Techniques Can Crack Some of SIGINT’S Hardest Targets

    Original Source: theintercept.com

  31. Hardware Trojan: Threats and Emerging Solutions

    Original Source: swarup.ece.ufl.edu

  32. U.S. Military Secrets for Sale at Afghan Bazaar

    Original Source: latimes.com

  33. Mission Impossible at the Sumitomo Bank

    Original Source: theregister.com

  34. NSA’s SENTRY EAGLE program

    Original Source: theintercept.com