China-based Supply Chain Cyberattacks Hit Thousands of Android
![](https://image-optimizer.cyberriskalliance.com/unsafe/3840x0/https://files.scmagazine.com/wp-content/uploads/2023/10/1004_malware.jpg)
![](https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c429d8a-c9a1-4ce2-9921-9bb7ede6165b_1584x396.png)
Daily Cyber and Tech Digest, ASPI Cyber, Tech & Security
![](https://i0.wp.com/georgetownsecuritystudiesreview.org/wp-content/uploads/2018/05/Screen-Shot-2018-05-23-at-5.59.48-PM.png?fit=471%2C332&ssl=1)
Flawed by Design: Electronics with Pre-Installed Malware – Georgetown Security Studies Review
![](https://www.securityweek.com/wp-content/uploads/2023/04/Iran-Cyberattacks.jpg)
Iran-Run ISP 'Cloudzy' Caught Supporting Nation-State APTs, Cybercrime Hacking Groups - SecurityWeek
![](https://i0.wp.com/securityaffairs.com/wp-content/uploads/2023/07/image-5.png?fit=1105%2C562&ssl=1)
SmugX: Chinese APT uses HTML smuggling to target European Ministries and embassies
![](https://cdn.comparitech.com/wp-content/uploads/2018/10/300-cyber-security-and-cyber-crime-statistics.webp)
300+ Terrifying Cybercrime & Cybersecurity Statistics (2024)
![](https://image-optimizer.cyberriskalliance.com/unsafe/750x0/https://files.scmagazine.com/wp-content/uploads/2023/09/0918_cargo_containers.jpg)
China-based Supply Chain Cyberattacks Hit Thousands of Android Devices
Supply Chain Attacks: A Growing Threat
![](https://www.kratikal.com/blog/wp-content/uploads/2021/10/Impact-of-SolarWinds-Supply-Chain-Attack.jpg)
SolarWinds & Accellion Breaches: Supply Chain Attacks Wreaking Havoc - Security Boulevard
![](https://krebsonsecurity.com/wp-content/uploads/2019/06/googgraphic.jpg)
Tracing the Supply Chain Attack on Android – Krebs on Security
![](https://www.sasa-software.com/wp-content/uploads/2021/03/Image-for-Supply-Chain-blog-1st-picture.png)
Supply Chain Attacks and their impact on OT/ICS Cybersecurity
![](https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i4kDjotJJGQg/v0/-1x-1.png)
Supermicro Hack: How China Exploited a U.S. Tech Supplier Over Years
![](https://cdn.ttgtmedia.com/rms/onlineimages/security-supply_chain_attack-h_half_column_mobile.png)
What is a Supply Chain Attack?