article thumbnail

June Firmware Threat Report

Security Boulevard

As readers of this report will know, […]. The post June Firmware Threat Report appeared first on Security Boulevard. Taken together, this chain of vulnerabilities has a CVSS score of 8.3

article thumbnail

December Firmware Threat Report

Security Boulevard

Let’s see if we can write a threat report without mentioning log4j. The post December Firmware Threat Report appeared first on Security Boulevard. Let’s find out!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

September Firmware Threat Report

Security Boulevard

Spyware found embedded in UEFI and MBR firmware - ran undetected for years. The post September Firmware Threat Report appeared first on Security Boulevard.

article thumbnail

November Firmware Threat Report

Security Boulevard

Whether it’s the Executive Office, the average consumer, or the threat actors, all eyes are on the security of the technology supply chain. The post November Firmware Threat Report appeared first on Security Boulevard.

article thumbnail

March Firmware Threat Report

Security Boulevard

The post March Firmware Threat Report appeared first on Security Boulevard. While the media and industry is telling you that the hybrid/cyber conflict surrounding the invasion of Ukraine has been underwhelming, nothing could be further from the truth.

article thumbnail

December Firmware Threat Report

Security Boulevard

This month’s report is going to dive into predictions in the device/IT supply chain space, relevant to our industry, and based on existing trends that all point to The Supplyocalpyse: Appetite for Destruction. The post December Firmware Threat Report appeared first on Security Boulevard.

article thumbnail

May Firmware Threat Report

Security Boulevard

The post May Firmware Threat Report appeared first on Security Boulevard. The SolarWinds and related supply chain attacks put our government through the crucible of painful incident response and restoration efforts. The events also became a watershed moment, one in which cyber risk to national security fully materialized. […].