Cyberside Chats: Cybersecurity Insights from the Experts

Made in China—Hacked Everywhere?


Listen Later

From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere—including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. 

We’ll break down new government warnings about hidden communication modules, rogue firmware, and “ghost devices” in imported tech—and how even trusted brands may ship products with risky components. Most importantly, we’ll share what you can do right now to identify exposure, strengthen procurement and third-party risk management (TPRM) processes, and protect your organization before the next breach or regulation hits. 

Join us live for a 25-minute deep dive plus Q&A—and find out whether your supply chain is truly secure… or “Made in China—and Hacked Everywhere.” 

Key Takeaways: 

  1. Require an Access Bill of Materials (ABOM) for every connected device. Ask vendors to disclose all remote access paths, cloud services, SIMs/radios, update servers, and subcontractors. This is the most effective way to catch hidden modems, undocumented connectivity, or offshore control channels before procurement. 
    1. Treat hardware procurement with the same rigor as software supply chain risk. Routers, cameras, inverters, and vehicles must be vetted like software: know the origin of components, how firmware is managed, and who can control or modify the device. This mindset shift prevents accidental onboarding of hidden risks. 
      1. Establish and enforce a simple connected-device procurement policy. Set clear rules: no undocumented connectivity, no unmanaged remote access, no end-of-life firmware in new buys, and mandatory security review for all "smart" devices. This helps buyers avoid risky equipment even when budgets are tight. 
        1. Reduce exposure through segmentation and access restrictions. Before replacing anything, isolate high-risk devices, block unnecessary outbound traffic, and disable vendor remote access. These low-cost steps significantly reduce exposure while giving you time to plan longer-term changes. 
          1. Strengthen third-party risk management (TPRM) for vendors of connected equipment. Expand TPRM reviews to cover firmware integrity, logging, hosting jurisdictions, remote access practices, and subcontractors. This ensures your vendor ecosystem doesn't introduce avoidable hardware-level vulnerabilities. 
          2.  

            References: 

            • Wall Street Journal (Nov 19, 2025) – “Can Chinese-Made Buses Be Hacked? Norway Drove One Down a Mine to Find Out.” (Chinese electric bus remote-disable and SIM access findings) 
            • U.S. House Select Committee on China & House Homeland Security Committee (Sept 2024 Report) – Port Crane Security Assessment. (Unauthorized modems, supply-chain backdoors, and ZPMC risk findings) 
            • FDA & CISA (Feb–Mar 2025) – Security Advisory: Contec CMS8000 Patient Monitor. (Backdoor enabling remote file execution and hidden network communications) 
            • Anthropic (Nov 13, 2025) – “Disrupting the First Reported AI-Orchestrated Cyber Espionage Campaign.” 
            • (China-linked AI-driven intrusion playbook and campaign analysis) 
            • LMG Security (2025) – “9 Tips to Streamline Your Vendor Risk Management Program.” 
            • https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program 

              #chinesehackers #cybersecurity #infosec #LMGsecurity #ciso #TPRM #thirdpartyrisk #security

              ...more
              View all episodesView all episodes
              Download on the App Store

              Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside

              • 5
              • 5
              • 5
              • 5
              • 5

              5

              2 ratings


              More shows like Cyberside Chats: Cybersecurity Insights from the Experts

              View all
              No Agenda Show by Adam Curry & John C. Dvorak

              No Agenda Show

              5,948 Listeners

              Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

              Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

              370 Listeners

              The DSR Network by The DSR Network

              The DSR Network

              1,782 Listeners

              Conspirituality by Derek Beres, Matthew Remski, Julian Walker

              Conspirituality

              2,041 Listeners

              What Rough Beast by Virginia Heffernan and Stephen Metcalf

              What Rough Beast

              63 Listeners