Resources




Our team of supply chain experts and researchers is dedicated to maintaining an up-to-date and valuable resource on supply chain attacks and exploits. While not exhaustive, this list offers a broad overview of the diverse attack vectors that impact the global ICT supply chain. We aim to provide insights that help you better understand the evolving landscape of cyber threats and vulnerabilities.



Please note that all information published here is derived from publicly available sources, including security research and investigative journalism. None of the content is classified or commercially sensitive; it remains entirely within the public domain.



PDFs have been captured and are periodically updated to provide a record in the event that the original source is removed.




  1. Undocumented commands found in Bluetooth chip used by a billion devices

    Original Source: bleepingcomputer.com

  2. Backdoor found in two healthcare patient monitors, linked to IP in China

    Original Source: bleepingcomputer.com

  3. Mind the (air) gap: GoldenJackal gooses government guardrails

    Original Source: eset.com

  4. Israel’s Pager Attacks Have Changed the World

    Original Source: nytimes.com

  5. “BadAlloc” – Memory allocation vulnerability

    Original Source: blackberry.com

  6. Phoenix UEFI vulnerability impacts hundreds of Intel PC models

    Original Source: bleepingcomputer.com

  7. The risks associated with Industrial IoT (Internet of Things)

    Original Source: archonsecure.com

  8. Ecuadorian TV presenter wounded by bomb disguised as USB stick

    Original Source: theguardian.com

  9. QCT Servers Affected by ‘Pantsdown’ BMC Vulnerability

    Original Source: securityweek.com

  10. Takeover risk to hundreds of IoT devices

    Original Source: portswigger.net

  11. Toyota production to resume after supply chain attack

    Original Source: computerweekly.com

  12. Supply chain attacks are on the rise

    Original Source: cpomagazine.com

  13. Jumping the air gap: 15 years of nation-state effort

    Original Source: eset.com

  14. Decade-long vulnerability in multiple routers could allow network compromise

    Original Source: medium.com/tenable-techblog

  15. Realtek flaw exposes dozens of brands to supply chain attacks

    Original Source: zdnet.com

  16. INFRA:HALT 14 New Security Vulnerabilities Found in NicheStack

    Original Source: jfrog.com/

  17. The Long Hack: How China Exploited a U.S. Tech Supplier

    Original Source: bloomberg.com

  18. BBC NEWS Eric Schmidt: Huawei has engaged in unacceptable practices

    Original Source: bbc.com

  19. MITRE ATT&CK: Supply chain compromise

    Original Source: infosecinstitute.com

  20. Every Part of the Supply Chain Can Be Attacked

    Original Source: nytimes.com

  21. Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains

    Original Source: theintercept.com

  22. The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

    Original Source: bloomberg.com

  23. On DoD warning about Lenovo

    Original Source: executivegov.com

  24. Researchers crack open unusually advanced malware that hid for 5 years

    Original Source: arstechnica.com

  25. Hackers Remotely Kill a Jeep on the Highway—With Me in It

    Original Source: wired.com

  26. Building reliable SMM backdoor for UEFI based platforms

    Original Source: blog.cr4.sh

  27. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

    Original Source: arstechnica.com

  28. A undetectable Hardware Trojan is reality

    Original Source: securityaffairs.co

  29. Spy agencies ban on Lenovo PCs due to backdoor vulnerabilities

    Original Source: securityaffairs.co

  30. The ISA Guidelines For Securing The Electronics Supply Chain

    Original Source: isalliance.org

  31. Rakshasa: The hardware backdoor that China could embed in every computer

    Original Source: extremetech.com

  32. Intellipedia - Air Gapped Network Threats

    Original Source: theintercept.com

  33. NSA/CSS target exploitation (TAREX) classification guide

    Original Source: theintercept.com

  34. Can DARPA Fix the Cybersecurity ‘Problem From Hell?’

    Original Source: wired.com

  35. DHS: Imported Consumer Tech Contains Hidden Hacker Attack Tools

    Original Source: fastcompany.com

  36. Stealthy Techniques Can Crack Some of SIGINT’S Hardest Targets

    Original Source: theintercept.com

  37. Hardware Trojan: Threats and Emerging Solutions

    Original Source: swarup.ece.ufl.edu

  38. U.S. Military Secrets for Sale at Afghan Bazaar

    Original Source: latimes.com

  39. Mission Impossible at the Sumitomo Bank

    Original Source: theregister.com

  40. NSA’s SENTRY EAGLE program

    Original Source: theintercept.com