The ‘Bootkitty’ Linux UEFI bootkit, an in-development malware primarily targeting specific Ubuntu versions, exploits the LogoFAIL flaw to attack computers running vulnerable firmware. Bootkitty uses shellcode within BMP files to bypass Secure Boot protections and inject rogue certifications into the system. The malware can potentially infect any unpatched device. Binarly, a firmware security firm that discovered LogoFAIL, emphasizes that fixes need to be deployed to minimise impressions from such vulnerabilities.
Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
Israel-based Sweet Security has launched a unified cloud native detection and response platform that combines the functions of application, cloud and workload protection into a