• Platform
    • PLATFORM OVERVIEW
    • -
    • Eclypsium Protects:
    • - User Endpoints
    • - Servers
    • - Network Devices
    • - AI Hardware
  • Solutions
      • Solutions Overview
      • Solutions Overview
      • Device Lifecycle Management
      • Digital Supply Chain
        Security
      • Firmware Security
        for Enterprises
      • Regulatory Compliance
      • Zero Trust
        for Endpoints
    • –
      • Public Sector
      • Financial Services
      • Telecommunications
      • Energy and Utilities
  • Resources
      • Resources Overview
      • All Resources
      • CASE STUDIES
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • SOLUTION BRIEFS
      • THREAT REPORTS
      • WHITE PAPERS
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        OWASP Update Elevates Software Supply Chain and Misconfiguration Risk

        Learn more
        Blog

        The Future of F5 Risk In The Enterprise

        Learn more
  • Research
  • Company
    • Company Overview
    • Company Overview
    • Team
    • Newsroom
    • Careers
    • Partners
    • Contact
  • US
  • JP
  • Get a demo
  • Take a Tour
  • US
  • JP
  • Get a demo
  • Take a Tour
  • Platform
    • PLATFORM OVERVIEW
    • -
    • Eclypsium Protects:
    • - User Endpoints
    • - Servers
    • - Network Devices
    • - AI Hardware
  • Solutions
      • Solutions Overview
      • Solutions Overview
      • Device Lifecycle Management
      • Digital Supply Chain
        Security
      • Firmware Security
        for Enterprises
      • Regulatory Compliance
      • Zero Trust
        for Endpoints
    • –
      • Public Sector
      • Financial Services
      • Telecommunications
      • Energy and Utilities
  • Resources
      • Resources Overview
      • All Resources
      • CASE STUDIES
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • SOLUTION BRIEFS
      • THREAT REPORTS
      • WHITE PAPERS
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        OWASP Update Elevates Software Supply Chain and Misconfiguration Risk

        Learn more
        Blog

        The Future of F5 Risk In The Enterprise

        Learn more
  • Research
  • Company
    • Company Overview
    • Company Overview
    • Team
    • Newsroom
    • Careers
    • Partners
    • Contact
PODCASTS

BTS #7 - Nicholas Starke

By: Eclypsium
April 5, 2023
Eclypsium presents Below The Surface text on top of ocean waves

Discuss current events in firmware security, such as the techniques utilized in BlackLotus. We will compare Baton Drop with Grub2 capabilities.

Segment Resources: https://starkeblog.com/

Show Notes: https://securityweekly.com/bts7

Subscribe

Back to Blog
Related Blogs
View all
PODCASTS

BTS #63 - F5 Breach, Linux Malware, and Hacking Banks

Read more
PODCASTS

BTS #62 - Unpacking the F5 Breach, Framework UEFI Shells

Read more
PODCASTS

BTS #61 - Red November, Cisco Vulnerabilities, and Supply Chain Security

Read more
PODCASTS

BTS #60 - HybridPetya and UEFI Threats

Read more
Eclypsium | Supply Chain Security for the Modern Enterprise
Get a Demo Contact Us
Platform
  • Title
    • Supply Chain Security
    • Supply Chain Intelligence
Research
Solutions
  • Title
    • Digital Supply Chain Security
    • Firmware Security for Enterprises
    • Compliance
    • Zero Trust for Endpoints
Resources
  • Title
    • Blog
    • Events
    • Podcasts
    • White Papers
    • Support
  • Title
    • Solution Briefs
    • Threat Reports
    • Newsletter
Company
  • Title
    • Team
    • Newsroom
    • Careers
    • Partners
    • Security
    • Contact
  • Linkedin
  • Youtube
  • Twitter
  • Facebook
© 2025 Eclypsium, Inc.
Privacy Policy | Terms of Use | Sitemap