
A half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit hunting
Three Buddy Problem
00:00
Navigating UEFI Vulnerabilities
This chapter explores the challenges companies face in maintaining outdated network appliances vulnerable to cyber threats. It delves into the complexities of detecting UEFI bootkits and highlights the shortcomings of current malware detection tools like Yara. The discussion emphasizes the critical need for improved security measures and the importance of ongoing research in firmware analysis.
Transcript
Play full episode