Below the OS: UEFI Scanning in Defender
Listen now
Description
All of us have seen – or at least, are familiar with – the antics of Tom and Jerry or Road Runner and Wile E. Coyote. In each one the coyote or the cat set up these elaborate plans to sabotage their foe, but time and time again, the nimble mouse and the speedy bird are able to outsmart their attackers.   In our third episode discussing Ensuring Firmware Security, hosts Nic Fillingham and Natalia Godyla speak with Shweta Jha and Gowtham Reddy about developing the tools that allow for them to stay one step ahead of cybercriminals in the cat & mouse game that is cyber security.      In this Episode You Will Learn:  • The new capabilities within Microsoft Defender to scan the Unified Extensible Firmware Interface (UEFI) • How the LoJax attack compromised UEFI firmware • How UEFI scanning emerged as a capability   Some Questions that We Ask:  • Has UEFI scanning always been possible?  • What types of signals is UEFI scanning searching for?  • What are the ways bad actors may adjust to avoid UEFI scanning?  Resources:   Shweta Jha’s LinkedIn:  https://www.linkedin.com/in/jhashweta/  Gowtham Reddy’s LinkedIn:  https://www.linkedin.com/in/gowtham-animi/  Defender Blog Post:  https://www.microsoft.com/security/blog/2020/06/17/uefi-scanner-brings-microsoft-defender-atp-protection-to-a-new-level/  Nic Fillingham’s LinkedIn:  https://www.linkedin.com/in/nicfill/  Natalia Godyla’s LinkedIn:  https://www.linkedin.com/in/nataliagodyla/  See acast.com/privacy for privacy and opt-out information.
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22