Bricking a system through updates [closed]


I was wondering if someone could explain to me the technical process when bricking a system by sending or receiving fraudulent hardware updates in an offensive and defensive manner.