
Sign up to save your podcasts
Or


In this episode, the hosts discuss various cybersecurity topics, focusing on hardware vulnerabilities, UEFI attack vectors, and the implications of new regulations on device security. They explore the evolution of Mirai variants targeting IoT devices and the challenges of securing firmware. The conversation highlights the need for improved security measures and the complexities of managing vulnerabilities in a rapidly changing technological landscape.
00:00 Introduction and Technical Challenges
02:37 Exploring UEFI Settings and Hardware Vulnerabilities
10:14 The Risks of UEFI Control and Physical Damage
16:33 Static Tundra: Cyber Espionage and Exploits
22:23 Targeting Vulnerable Infrastructure in Cyber Attacks
26:27 Emerging Threats in IoT and Network Devices
31:55 The Evolution of Malware: A Deep Dive
34:30 The Challenge of Securing IoT Devices
35:13 Impact of EU Cyber Resilience Act
38:14 Vulnerability Management and Vendor Responsibilities
41:54 Living Outside the Operating System: New Attack Vectors
By Eclypsium5
22 ratings
In this episode, the hosts discuss various cybersecurity topics, focusing on hardware vulnerabilities, UEFI attack vectors, and the implications of new regulations on device security. They explore the evolution of Mirai variants targeting IoT devices and the challenges of securing firmware. The conversation highlights the need for improved security measures and the complexities of managing vulnerabilities in a rapidly changing technological landscape.
00:00 Introduction and Technical Challenges
02:37 Exploring UEFI Settings and Hardware Vulnerabilities
10:14 The Risks of UEFI Control and Physical Damage
16:33 Static Tundra: Cyber Espionage and Exploits
22:23 Targeting Vulnerable Infrastructure in Cyber Attacks
26:27 Emerging Threats in IoT and Network Devices
31:55 The Evolution of Malware: A Deep Dive
34:30 The Challenge of Securing IoT Devices
35:13 Impact of EU Cyber Resilience Act
38:14 Vulnerability Management and Vendor Responsibilities
41:54 Living Outside the Operating System: New Attack Vectors

229,305 Listeners

153,606 Listeners

2,010 Listeners

209 Listeners

268 Listeners

374 Listeners

654 Listeners

16 Listeners

89 Listeners

318 Listeners

8,043 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
92 Listeners

61 Listeners

607 Listeners

1 Listeners