#1667497: Top Firmware Attack Vectors: Supply Chain Security's Missing Link

Description: Firmware presents real threats to the enterprise, and an attack surface enticing to threat actors. Cyberattackers use firmware vulnerabilities to break in and achieve persistence inside target environments, leading to repeated data breaches. In this webinar we’ll discuss how firmware vulnerabilities make their way through the IT infrastructure supply chain, and how to protect your enterprise from this growing category of threat.

We’ll cover:

Where firmware comes from, and how it brings vulnerabilities in the enterprise’s front door.
Backdoors, malware, and firmware tampering for persistence
Mis-Configured or Missing Security Controls - UEFI, missing or misconfigured Secure Boot, Intel Bootguard, and more
Recently disclosed vulnerabilities and research in firmware threats
More info: https://info.eclypsium.com/top-firmware-attack-vectors-february-2025?utm_campaign=8236945-2025-02-27-Webubar-Top%20Firmware%20Attack%20Vectors%3A%20Supply%20Chain%20Security%E2%80%99s%20Missing%20Link&utm_medium=email&_hsenc=p2ANqtz-_3Te9s6ylUyKUj5JkW7-k-clivtFQtj43E9XvnFsdmvjpKYaMdJzJRZ3o-kJ_cYz6TSRu_jNUsSj5HzC_0LBDRlo4--A&_hsmi=348195640&utm_content=348195640&utm_source=hs_email

Date added Feb. 20, 2025, 9:42 p.m.
Source Eclypsium
Subjects
  • Firmware - Various
  • Info on - Backdoors, Trojans and RATs
  • PodCasts / Webcast / Webinar / eSummit / Virtual Event etc.
  • Retail / Supply Chain Industry News
  • Security Management/Strategic Security/ROI/ROSI
  • UEFI - Unified Extensible Firmware Interface
Venue Feb. 27, 2025, midnight - Feb. 27, 2025, midnight