#1667497: Top Firmware Attack Vectors: Supply Chain Security's Missing Link
Description: |
Firmware presents real threats to the enterprise, and an attack surface enticing to threat actors. Cyberattackers use firmware vulnerabilities to break in and achieve persistence inside target environments, leading to repeated data breaches. In this webinar we’ll discuss how firmware vulnerabilities make their way through the IT infrastructure supply chain, and how to protect your enterprise from this growing category of threat. We’ll cover: Where firmware comes from, and how it brings vulnerabilities in the enterprise’s front door. Backdoors, malware, and firmware tampering for persistence Mis-Configured or Missing Security Controls - UEFI, missing or misconfigured Secure Boot, Intel Bootguard, and more Recently disclosed vulnerabilities and research in firmware threats |
---|---|
More info: | https://info.eclypsium.com/top-firmware-attack-vectors-february-2025?utm_campaign=8236945-2025-02-27-Webubar-Top%20Firmware%20Attack%20Vectors%3A%20Supply%20Chain%20Security%E2%80%99s%20Missing%20Link&utm_medium=email&_hsenc=p2ANqtz-_3Te9s6ylUyKUj5JkW7-k-clivtFQtj43E9XvnFsdmvjpKYaMdJzJRZ3o-kJ_cYz6TSRu_jNUsSj5HzC_0LBDRlo4--A&_hsmi=348195640&utm_content=348195640&utm_source=hs_email |
Date added | Feb. 20, 2025, 9:42 p.m. |
---|---|
Source | Eclypsium |
Subjects | |
Venue | Feb. 27, 2025, midnight - Feb. 27, 2025, midnight |