Podcast Episode Details

Back to Podcast Episodes
HybridPetya and UEFI Threats

HybridPetya and UEFI Threats


Episode 60


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the evolution of malware with a focus on Hybrid Petya, the implications of UEFI vulnerabilities, and the security risks associated with Windows 10's end of life. They also explore the vulnerabilities of Cisco ASA devices, the rise of supply chain attacks exemplified by NPM worms, and the persistent threat of Row Hammer attacks on DDR5 technology. The conversation highlights the significance of visibility in cybersecurity and the necessity for enhanced security practices to counter evolving threats.

Chapters

 

00:00 Introduction and Podcast Overview

02:55 Hybrid Petya: The New Threat Landscape

06:03 Understanding UEFI and Secure Boot Vulnerabilities

09:00 The Evolution of Ransomware Techniques

11:54 Windows 10 End of Life Concerns

14:56 The Future of Secure Boot and User Responsibility

22:50 The Shift in Consumer Trust Towards Microsoft

25:11 The Rise of Alternatives: Linux and SteamOS

28:41 Security Concerns with Windows 10 and 11

31:57 Exploiting End-of-Life Devices

36:39 The Challenge of Legacy Infrastructure

39:41 VPN Security: Risks and Solutions

45:40 The Dilemma of Compliance and Visibility

50:16 Supply Chain Vulnerabilities and NPM Attacks

55:54 The Rowhammer Attack and Hardware Security

01:03:40 The Need for Visibility and Signatures in Security

 


Published on 2 weeks, 2 days ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate