US regulators have done little to address firmware vulnerabilities, think tank argues
Briefly

"[They] are often harder to detect and harder to remove than their software cyberattack counterparts," he said. Common antivirus scanning tools "can only detect malware at the software level, which leaves firmware completely in the dark," he added.
Firmware is often made vulnerable due to weak code bases that aren't addressed during their building and deployment processes, leaving them open to attacks across the software supply chain.
Read at Nextgov.com
[
add
]
[
|
|
]