Recent reporting suggests that malicious actors used a hardware supply chain attack. This threat is becoming a priority across the industry.
Newly published in-the-wild UEFI rootkit leverages research into firmware vulnerabilities.
Supermicro BMC Case Study Baseboard Management Controllers (BMCs) are high-value targets to attackers, who can use the out-of-band management features … More
Today, we are proud to announce the availability of the Eclypsium platform beta version!
It has been a busy and exciting few weeks for the team here at Eclypsium, capped off with the chance … More
Debug mechanisms are standard components that assist in tracing the source of faults in virtually of all platforms.. These mechanisms … More
As part of our ongoing security research efforts, we recently reviewed various Supermicro systems and discovered serious firmware vulnerabilities.
Eclypsium researchers have discovered a new application of speculative execution attacks, bypassing hardware-based memory protections.
Eclypsium researchers are speaking and training at Black Hat USA 2018.