Eclypsium Researchers Demonstrate Direct Memory Attacks

direct memory attack

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start and Microsoft Virtualization-Based Security. Jesse Michael, principal researcher for Eclypsium, said these attacks can be launched..

The post Eclypsium Researchers Demonstrate Direct Memory Attacks appeared first on Security Boulevard.