Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
How we used Brick to discover six different vulnerabilities affecting HP laptops' firmware
Read More
How we used Brick to discover six different vulnerabilities affecting HP laptops' firmware
In Part 5 of our ongoing series on UEFI security research, we dive into the fascinating world of hunting and exploiting SMM vulnerabilities.
A new malware is attacking Ukrainian organizations and erasing Windows devices. In this early analysis, we provide technical details, IOCS and hunting rules.
What really happened to Evil Corp after the OFAC sanctions? Did they cut and run, or are they still operating with impunity?
Threat actor exploits Log4j2 vulnerabilities to drop PowerShell backdoors, harvest credentials, and communicate via legitimate services.
A previously unreported threat actor has been targeting civil society for over a decade. Read about how it operates and its relationships to other threats.
Learn how to dive into JIT compilers in JavaScript engines and follow along as we find a new set of exploit primitives in this previously patched bug.
Are there still real hacktivists out there or are they all a cover for state-sponsored operations?
With victims in the US, Australia and India, BlackCat is a new RaaS making a big impact. Learn more about this unique ransomware's behavior and IoCs.
MuddyWater APT's updated toolkit: an evolution of PowGoop malware, abuse of tunneling tools, and targeting of Exchange servers. MuddyWater's activities are attributed to the Iranian Ministry of Intelligence by U.S. Cyber Command.