When most of us think of cyberattacks, we think of hackers breaching the networks of companies or governments, then proceeding to steal valuable data. In reality, many cyberattacks are more fundamental—exploiting vulnerabilities that work their way through the supply chain, in chips or devices that were already infected when they hit the market.
The issue of supply chain threats means that many devices are fundamentally breached through back doors and viruses installed on the inner parts of a device. Even if the user wiped the device, the vulnerability would remain. In past years, this was cited by many experts in the defense and cyber community as a threat not only for the customers and companies in the United States, but also for the military.





