
Risky Business #759 – Why Iran's hack and leak will amount to naught
Risky Business
00:00
AMD CPU Security Vulnerabilities and Exploitation Techniques
This chapter examines the security issues related to AMD CPUs, emphasizing vulnerabilities in system management mode that could allow unauthorized access. It explores advanced post-exploitation techniques, detailing how attackers can manipulate system updates and bypass security measures like Secure Boot. Additionally, the discussion highlights recent research on web application security, illustrating real-world implications for penetration testing and vulnerability mitigation.
Transcript
Play full episode