Addressing Thunderspy, One Weakness at A Time

  1. Inadequate firmware verification schemes

--

--

--

Lead author: Steve Battista. Support: Steve Christey Coley, Adam Chaudry, Rich Piazza, and Alec Summers. https://cwe.mitre.org + https://capec.mitre.org

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

TryHackMe: Blue write up

Intuit sabotages the Child Tax Credit

A screenshot of freefilefillableforms.com, a very bad and inaccessible website.

Ethernity Token Economics Update

My Cyber Why — Debbie Taylor Moore, Partner, Energy Cyber Partners

Presentation of the team and KyC by the CryptoHouse [EN]

Tankpad partial refund announcement

20000 BTT Tips of forum post

Taurus Group SA Joins ubinetic Oracle As Data Transmitter

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
CWE/CAPEC

CWE/CAPEC

Lead author: Steve Battista. Support: Steve Christey Coley, Adam Chaudry, Rich Piazza, and Alec Summers. https://cwe.mitre.org + https://capec.mitre.org

More from Medium

How does the factory model help to onboard a large number of apps in a scalable and faster manner?

Is Google left behind in 2021?

Osquery: What It Is, How It Works, and How To Use It

🌁The road to success is paved with…IPv4 over SRv6 over ISIS and BGP on SROS 21.10🌄