Shorter certificate lifespans are beneficial, but they require a rethink of how to properly manage them. Read More
Related Posts
Identity attacks. Proton Mail vulnerability. Driving into a privacy pothole. Healthcare provider discloses effect of third-party data incident.
Identity attacks. Proton Mail vulnerability. Driving into a privacy pothole. Healthcare provider discloses effect of third-party data incident.
Report: Security gaps allow for identity attacks. Proton Mail vulnerability allowed for email theft. Driving into a privacy pothole. Healthcare provider discloses effect of third-party data incident. Read More
The CyberWire
Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation
Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation
Quarkslab finds serious, remotely exploitable vulnerabilities in EDK II, the de-facto open source reference implementation of the UEFI spec.
The post Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation appeared first on SecurityWeek.
SecurityWeek RSS Feed