
Risky Business #759 – Why Iran's hack and leak will amount to naught
Risky Business
AMD CPU Security Vulnerabilities and Exploitation Techniques
This chapter examines the security issues related to AMD CPUs, emphasizing vulnerabilities in system management mode that could allow unauthorized access. It explores advanced post-exploitation techniques, detailing how attackers can manipulate system updates and bypass security measures like Secure Boot. Additionally, the discussion highlights recent research on web application security, illustrating real-world implications for penetration testing and vulnerability mitigation.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.