As firmware-level threats continue to gain popularity in the wild, security teams need to understand how these threats work and the real-world risks they pose to an organization’s security.
Recently updated, this research demystifies the most common types of firmware attacks used in the wild today, including some of the most significant developments in firmware threats and vulnerabilities:
- Widespread Attacks Against VPN Devices and Firmware
- New Firmware “TrickBoot” Module Added to TrickBot
- Newly Discovered UEFI Implants In the Wild
- Pervasive BootHole Vulnerability
See the full analysis of firmware threats and vulnerabilities that enable attackers to gain fundamental control of enterprise devices, subvert security controls, and persist invisibly, undetected by traditional security solutions.