In Pictures: 15 of the scariest things hacked
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
Unlike consumer electronics, cars can stay in use for decades, long after operating systems and component software cease being supported through updates that patch vulnerabilities - a challenge the industry is still grappling with.
Prime Minister Boyko Borissov described the arrested man as a "wizard" hacker and said the country should hire similar "unique brains" to work for the state rather than against it
Bulgaria's finance minister apologized to the country on Tuesday after admitting hackers had stolen millions of taxpayers' financial data in an attack that one researcher said may have compromised nearly every adult's personal records.
The global hacking campaign, known as Cloud Hopper, is attributed to China by the United States and its Western allies.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
With technology supply chains rapidly evolving to all corners of the globe, doors continually open for unsavoury elements to find new ways to take advantage. Whether for personal gain, monetary gain, criminal activity, espionage, or military threat, black hats keep unearthing opportunities to exploit supply chain vulnerabilities.