• Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Business Need
        • Device Lifecycle Security
        • Firmware Security
        • Cyber Supply Chain Security (C-SCRM)
        • Regulatory Compliance
      • -
        • Threat Exposure Management (CTEM)
        • Ransomware Defense
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog, RESEARCH

        Your KVM is the Weak Link: How $30 Devices Can Own Your Entire Network

        Learn more
        Blog

        New Malware Highlights Increased Systematic Targeting of Network Infrastructure

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact
  • US
  • JP
  • Get a demo
  • Take a Tour
  • US
  • JP
  • Get a demo
  • Take a Tour
  • Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Business Need
        • Device Lifecycle Security
        • Firmware Security
        • Cyber Supply Chain Security (C-SCRM)
        • Regulatory Compliance
      • -
        • Threat Exposure Management (CTEM)
        • Ransomware Defense
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog, RESEARCH

        Your KVM is the Weak Link: How $30 Devices Can Own Your Entire Network

        Learn more
        Blog

        New Malware Highlights Increased Systematic Targeting of Network Infrastructure

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact
NEWS

Medium: Cyber Briefing: 2024.06.21

By: Eclypsium
June 21, 2024

Phoenix UEFI Vulnerability Exposes Intel Processors to Critical Threat

Back to Blog
Related Blogs
View all
NEWS

Researchers disclose vulnerabilities in IP KVMs from four manufacturers

Read more
NEWS

InfoRiskToday: Cheap and Dangerous: IP KVMs Carry Flaws

Read more
NEWS

The Stack: 4 KVM vendors, 9 vulns – including an unfixed CVSS 9.8

Read more
NEWS

The Register: EU sanctions Iranian cyber front over election meddling, Charlie Hebdo breach

Read more
Eclypsium | Supply Chain Security for the Modern Enterprise
Get a Demo Contact Us
Platform
  • Title
    • Supply Chain Security
    • Supply Chain Intelligence
Research
Solutions
  • Title
    • Cybersecurity Supply Chain Risk Management
    • Firmware Protection for Enterprises
    • Compliance
    • Zero Trust for Endpoints
Resources
  • Title
    • Blog
    • Events
    • Podcasts
    • White Papers
    • Support
  • Title
    • Solution Briefs
    • Threat Reports
    • Newsletter
Company
  • Title
    • Team
    • Newsroom
    • Careers
    • Partners
    • Security
    • Contact
  • Linkedin
  • Youtube
  • Twitter
  • Facebook
© 2025 Eclypsium, Inc.
Privacy Policy | Terms of Use | Sitemap