Managing the Hole in Secure Boot - Security Briefing

Presented by

Yuriy Bulygin, CEO Eclypsium and John Loucaides, VP R&D Eclypsium

About this talk

Eclypsium researchers have discovered an arbitrary code execution vulnerability - dubbed BootHole - in the GRUB2 bootloader that can bypass UEFI and OS Secure Boot, impacting other OS defenses. The vulnerability has been rated as High Severity (CVSS 8.2) and is being tracked as CVE-2020-10713. Attackers exploiting this vulnerability can install persistent and stealthy bootkits or malicious bootloaders that could give them near-total control over the victim device. The majority of laptops, desktops, servers and workstations are affected, as well as network appliances and other special purpose equipment used in industrial, healthcare, financial and other industries. In this webinar Yuriy Bulygin, CEO and John Loucaides, VP of Research and Development at Eclypsium, will provide a briefing on the key issues enterprise IT and security leaders need to know in order to effectively mitigate this issue.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (49)
Subscribers (3262)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.