Researchers discover a new module in the TrickBot toolset aimed at detecting UEFI / BIOS firmware vulnerabilities Join AdvIntel and…
Third-party application programming interfaces (APIs), libraries, and frameworks are a fact for modern software developers. They are usually complex, rapidly…
Join Eclypsium for a webinar discussing MosaicRegressor and how to protect your infrastructure from UEFI threats on Friday October 23rd…
Key Points Rooty Dolphin is a threat actor who uses Mekotio to target banks Mekotio is a banking trojan with Brazilian origins Rooty…
Key takeaways CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization…
The Cloud Security Alliance (CSA) this week published a free report intended to make it easier for cybersecurity teams to…
The recently published "The C-Suite Report: The Current and Future State of Cybersecurity" by Forcepoint in partnership with WSJ Intelligence…
By Chris Gerritz Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced…
GrammaTech is a new gold sponsor of the Cyber Security Forum Initiative (CSFI), a non-profit organization with a mission “to…
New threats in the wild combined with the recently disclosed BootHole vulnerability have made securing UEFI Secure Boot a top…