Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

Hardware Hackers Urge Vendor Engagement for Security Success

Cyberinchief by Cyberinchief
November 22, 2025
Reading Time: 3 mins read
0
Hardware Hackers Urge Vendor Engagement for Security Success


Endpoint Security
,
Hardware / Chip-level Security

RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

Experts Detail Upsides of Bug Bounties and Getting Devices Into Researchers’ Hands

Mathew J. Schwartz (euroinfosec) •
November 21, 2025    

Hardware Hackers Urge Vendor Engagement for Security Success
Image: Shutterstock

If hardware once had a reputation as an immutable root of trust, more than a decade of worries about compromised supply chains, side channel attacks and insecure enclaves have sanded that standing down to a stump.

See Also: Upgrade to a New AI Era at Work

Vulnerabilities are a fact of life – but how they end up in devices involves numerous factors. “I see hardware security vulnerabilities as a business problem with a business choice,” said Alex Guzman, CISO for Cisco Network Devices, speaking this week at the Hardware.io conference in Amsterdam. Information Security Media Group has invested in the conference.

“When you’re sourcing components and platforms that maybe are already out of date, or you choose a manufacturing model and you’re trying to go fast to market, you’re making decisions and trade-offs – fast to market or security, or not even considering security,” he warned the audience.

Security teams are and must continue to bridge that gap and “speak business language in terms of: Here’s the risk, and here’s why we need to solve it,” said Guzman, who also helps lead the OWASP Internet of Things Project, which aims to foster better understanding of IoT security issues and security decision-making.

Buy JNews
ADVERTISEMENT

How or if customers act on vulnerability patching and mitigation advice provided by vendors is another part of the equation.

“No one’s going to brush your teeth for you, right?” he said.

Veteran hardware hacker Adam Laurie, head of product security at electric-vehicle-charging firm Alpitronic, which manufactures electric vehicle chargers and sells them to charge point operators that badge the chargers with their name, regularly finds EV chargers exposed on the public internet. In many cases, his company will also have to remind the operators – as instructed when they first received the chargers – they need to change the initial password that shipped on the device.

It may seem Sisyphean to go through the same bad cybersecurity decisions year after year. Laurie gave a philosophical take, saying that lessons well-known in the security community require renewed emphasis anytime new technology arrives on the market. “I’ve been doing hardware or cybersecurity stuff for 30-odd years. I see the same lessons being learned over and over and over again. It’s an evolution.”

With so many new vulnerabilities in hardware, one question posed at the conference is whether vendors should be doing more.

Across multiple presentations at the event, many – although not all – speakers highlighted positive experiences with vendors. At least in some cases vendors were receptive to vulnerability reports and acted quickly to publish security alerts and firmware updates. Other manufacturers need additional prodding – as occurred when a well-known YouTube personality posted a widely watched video asking why a patch was so long in coming.

Some vendors put their money where their mouth is by pursuing bug bounty programs that they run or outsource to a third party to manage.

Some manufacturers sponsor hacking competitions, sometimes donating their own gear – for example, for Hardwear.io’s annual HardPwn challenge, which gives attendees the ability to hack well-known devices in return for prizes.

Featured devices this year included multiple offerings from Google, including the Pixel Phone 9a and also its TV Streamer, as well as Cisco’s MS130 and MS150 switches, plus numerous access points, as well as devices from at least vendor that asked to not be publicly named.

The competition revealed new vulnerabilities in some devices already reported to the relevant manufacturers. More flaws could come to light in the coming weeks since participants were able to take some devices away with them for further testing.

Vendors said hands-on pen testing needn’t be a one-time experience. Cisco told attendees that if there’s enterprise or industrial internet-of-things gear they want to get their hands on, and they have the hardware hacking bona fides, they’ll do everything they can to make that happen.

Justin Searle, director of ICS security at InGuardians and a long-time industrial control system and operational technology security trainer, said a recommendation he often gives to makers of big critical infrastructure products is to operate an invite-only bug bounty program for vetted members of the community. Whatever type of bug bounty program being run, it doesn’t necessarily need to feature cash rewards, but can instead offer useful equipment – soldering machine stations, for example – or fun swag.





Source link

Tags: EngagementHackersHardwareSecuritySuccessUrgeVendor
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
जामताड़ा कैसे बना Cyber Crime का हब | How Jamtara became a hub of cyber crime

जामताड़ा कैसे बना Cyber Crime का हब | How Jamtara became a hub of cyber crime

⚠️ 7-Zip Zero-Day Exploited — Update NOW! #cybersecurity #technews

⚠️ 7-Zip Zero-Day Exploited — Update NOW! #cybersecurity #technews

Recommended Stories

CYBERSECURITY RoadMap : How to become Ethical Hacker in 2024?

CYBERSECURITY RoadMap : How to become Ethical Hacker in 2024?

October 14, 2025
Hacker Explains How Police Cars & Airports are Hacked | Sam Curry #004

Hacker Explains How Police Cars & Airports are Hacked | Sam Curry #004

November 10, 2025
Shocking & Real Cases of Dark Web, Cyber Crime Scams & More Ft. Amit Dubey |RealHit

Shocking & Real Cases of Dark Web, Cyber Crime Scams & More Ft. Amit Dubey |RealHit

October 28, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested