Attacks against firmware are outpacing investments targeted at stopping them

representational image of a cloud firewall
(Image credit: Pixabay)

Businesses are investing more and more of their cybersecurity budgets to try secure firmware, but these investments are barely moving the needle, new research has suggested.

Firmware, unique computer software providing low-level control for specific hardware components, has become a popular target among cybercriminals. 

Now a report from Microsoft claims more than 80% of enterprises experienced at least one firmware attack in the past two years while allocating less than a third (29%) of their budgets to protecting the firmware.

Instead, they’re focusing their investments on security updates, vulnerability scanning, and advanced threat protection solutions. What’s more, the National Institute of Science and Technology’s (NIST) National Vulnerability Database (NVD) says the number of attacks against firmware rose five times in the last four years. Criminals are getting better and more destructive, every day.

Automation to the rescue

At the same time, many respondents said they were worried about malware accessing their systems and fear it may be difficult to detect them in time. For Microsoft, what the respondents are trying to suggest is that firmware is more difficult to monitor and control. Furthermore, the lack of automation is only making firmware vulnerabilities that much more dangerous.

Automation may lend a helping hand, as most respondents (82%) said they didn’t have the resources to tackle more high-impact security issues as they’re overwhelmed with low-yield manual work like software patching or hardware upgrades. A fifth (21%) of SDMs said they aren’t monitoring their firmware data. What’s more, 71% said they spend “too much” time on work that could be automated. 

Firmware owes its popularity among cybercriminals, partly for being a (relatively) easy target. Many devices available today don’t offer visibility into the firmware, making it hard for IT security professionals to keep tabs on them and make sure they aren’t compromised. But, it is also popular as it holds sensitive information, such as credentials or encryption keys

To make matters worse, many security teams are tackling the issue by bringing a knife to a gunfight. Instead of focusing on “strategic work”, as Microsoft puts it, many are focusing on “outdated protect and detect” models of security, such as the lack of proactive defense investment in kernel attack vectors.

Just below half (46%) of the respondents said they invested in hardware-based security features such as Kernel data protection (KDP), or memory encryption (36%), which are good at blocking malware that corrupts the OS kernel memory. 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
Latest in Security
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Polish space agency says it was hit by a cyberattack
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in News
Google Gemini iPhone Lock Screen
You can now access Gemini from your iPhone's lock screen
Michelle, Keats, and Doctor Amherst looking unimpressed and worried in The Electric State
Netflix drops trailer for The Electric State, and I'm getting serious District 9 vibes
YouTube TV
YouTube TV might be planning a big Netflix update that puts the best streaming services first
Google Pixel 9 Pro
Here are the 7 best Pixel 9 and Pixel Watch 3 features landing in March’s Pixel Feature Drop
Bang & Olufsen Beogram 4000C Saint Laurent Rive Droite Edition
Bang & Olufsen's latest reworked turntable is a masterpiece of retro revival, in a breathtaking wooden presentation box
Apple Watch Series 10
Apple unveils new Apple Watch bands – here's what's in the Spring 2025 collection