FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco and Nvidia: Redefining Workload Security

By: Jana Radhakrishnan β€” March 20th 2024 at 12:00

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

By: Newsroom β€” February 13th 2024 at 14:37
The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. "This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence that can be extremely difficult to
☐ β˜† βœ‡ The Hacker News

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

By: Newsroom β€” January 18th 2024 at 09:19
Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification used widely in modern computers. Collectively dubbed PixieFail by Quarkslab, the nine issues reside in the TianoCore EFI Development Kit II (EDK II) and could be exploited to
☐ β˜† βœ‡ The Hacker News

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

By: Newsroom β€” December 4th 2023 at 06:53
The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in image parsing libraries embedded into the firmware. The shortcomings, collectively labeled LogoFAIL by Binarly, "can be used by threat actors to deliver a malicious payload and bypass Secure Boot, Intel
☐ β˜† βœ‡ The Hacker News

NSA Releases Guide to Combat Powerful BlackLotus Bootkit Targeting Windows Systems

By: Ravie Lakshmanan β€” June 23rd 2023 at 09:13
The U.S. National Security Agency (NSA) on Thursday released guidance to help organizations detect and prevent infections of a Unified Extensible Firmware Interface (UEFI) bootkit calledΒ BlackLotus. To that end, the agency isΒ recommendingΒ that "infrastructure owners take action by hardening user executable policies and monitoring the integrity of the boot partition." BlackLotus is anΒ advancedΒ 
☐ β˜† βœ‡ The Hacker News

Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices

By: Ravie Lakshmanan β€” May 31st 2023 at 13:18
Cybersecurity researchers have found "backdoor-like behavior" within Gigabyte systems, which they say enables theΒ UEFI firmwareΒ of the devices to drop a Windows executable and retrieve updates in an unsecure format. Firmware security firm EclypsiumΒ saidΒ it first detected the anomaly in April 2023. Gigabyte has since acknowledged and addressed the issue. "Most Gigabyte firmware includes a Windows
☐ β˜† βœ‡ The Hacker News

MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web

By: Ravie Lakshmanan β€” May 8th 2023 at 15:23
The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company's private code signing keys on their dark website. "Confirmed, Intel OEM private key leaked, causing an impact on the entire ecosystem," Alex Matrosov, founder and CEO of firmware security firm Binarly,Β saidΒ in a tweet over the weekend. "It appears that Intel Boot Guard may not be
❌