Risky Business cover image

Risky Business #759 – Why Iran's hack and leak will amount to naught

Risky Business

CHAPTER

AMD CPU Security Vulnerabilities and Exploitation Techniques

This chapter examines the security issues related to AMD CPUs, emphasizing vulnerabilities in system management mode that could allow unauthorized access. It explores advanced post-exploitation techniques, detailing how attackers can manipulate system updates and bypass security measures like Secure Boot. Additionally, the discussion highlights recent research on web application security, illustrating real-world implications for penetration testing and vulnerability mitigation.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner