Risky Business cover image

Risky Business #759 – Why Iran's hack and leak will amount to naught

Risky Business

00:00

AMD CPU Security Vulnerabilities and Exploitation Techniques

This chapter examines the security issues related to AMD CPUs, emphasizing vulnerabilities in system management mode that could allow unauthorized access. It explores advanced post-exploitation techniques, detailing how attackers can manipulate system updates and bypass security measures like Secure Boot. Additionally, the discussion highlights recent research on web application security, illustrating real-world implications for penetration testing and vulnerability mitigation.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app