Secure Boot is integral in shielding a computer's boot environment from unauthorized code. By only allowing the execution of modules signed by Microsoft or the UEFI Certificate Authority (CA), it raises a barrier against attackers, primarily restricting them to vulnerabilities in legitimate code. While the bar for exploitation is high- typically requiring Admin or some physical access, the potential impact for disk encryption and malicious persistence is significant. This talk is a deep dive into the systemic weaknesses which undermine the security of your boot environment. We'll discuss what makes vulnerabilities in the boot stage so challenging to solve, yet so simple to find. We'll review gaps in the response processes of first- and third-parties and to top it off, the speaker will share a preview of the approaches Microsoft is taking to protect customers at scale. By: Bill Demirkapi | Security Engineer, Microsoft Security Response Center Full Abstract Available: https://ift.tt/Puiyk0s
source https://www.youtube.com/watch?v=pfr_sb4fyrI
Subscribe to:
Post Comments (Atom)
-
Axis Security, a company that specializes in private application access, emerged from stealth mode on Tuesday with $17 million in funding....
-
Germany recalled its ambassador to Russia for a week of consultations in Berlin following an alleged hacker attack on Chancellor Olaf Scho...
No comments:
Post a Comment