[HackerNews] Researchers Discover UEFI Bootkit Targeting Windows Computers Since 2012

Cybersecurity researchers on Tuesday revealed details of a previously undocumented UEFI (Unified Extensible Firmware Interface) bootkit that has been put to use by threat actors to backdoor Windows systems as early as 2012 by modifying a legitimate Windows Boot Manager binary to achieve persistence, once again demonstrating how technology meant to secure the environment prior to loading the

Source: Read More (The Hacker News)

You might be interested in …

[SecurityWeek] Ransomware Recovery Startup Calamu Banks $16.5M Investment

All posts, Security Week

Calamu, an early-stage cybersecurity startup building technology to help businesses recover from ransomware infections, has raised $16.5 million in venture capital funding. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Daily NCSC-FI news followup 2021-12-29

Threat actor uses HP iLO rootkit to wipe servers therecord.media/threat-actor-uses-hp-ilo-rootkit-to-wipe-servers/ An Iranian cyber-security firm said it discovered a first-of-its-kind rootkit that hides inside the firmware of HP iLO devices and which has been used in real-world attacks to wipe servers of Iranian organizations. Named iLOBleed, the rootkit was discovered by Tehran-based security firm Amnpardaz and […]

Read More

[SANS ISC] ISC Stormcast For Wednesday, August 11th, 2021 https://isc.sans.edu/podcastdetail.html?id=7624, (Wed, Aug 11th)

All posts, Sans-ISC

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS Internet Storm Center, InfoCON: green)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.