REsearch

REsearch

REsearch

The Binary REsearch team leads the industry in firmware vulnerability disclosure and advisories

Black Hat 2022: The Intel PPAM attack story

Binarly efiXplorer Team

The increasingly large number of firmware vulnerabilities gives attackers a lot of options for persistence and the means to bypass traditional endpoint solutions. At least two recently discovered firmware implants -- MoonBounce and CosmicStrand -- have persisted for more than seven years by using basic firmware bootkit techniques. In general, the UEFI system firmware grows in complexity every year and constantly introduces new attack surfaces.

Read more