A Secure Supply Chain Requires Independent Visibility Into Firmware

Once again, supply chain risks are in the news, with Bloomberg reporting attacks compromising servers via malicious firmware updates. While we don’t have many technical details about the attacks reported in the Bloomberg article, the risk associated wi… Continue reading A Secure Supply Chain Requires Independent Visibility Into Firmware

In the Shadow of Sunburst: Hunting for Firmware Persistence in the Context of Supply Chain Attack IR

Download the PDF > In the wake of the Sunburst attack, IR and threat hunting are more important than ever, and firmware should be a key part of these efforts. As organizations continue to uncover the magnitude of these events, it is time to conside… Continue reading In the Shadow of Sunburst: Hunting for Firmware Persistence in the Context of Supply Chain Attack IR

Detect and Mitigate Critical Intel Vulnerabilities (INTEL-SA-00241, INTEL-SA-00404)

Enterprise devices include a variety of components that are critical to the security posture of the device. Components used for out-of-band management and Trusted Platform Modules (TPM) used to protect cryptographic keys on  the device are just a few e… Continue reading Detect and Mitigate Critical Intel Vulnerabilities (INTEL-SA-00241, INTEL-SA-00404)