DiscoverBelow the Surface (Audio) - The Supply Chain Security PodcastNetgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55
Netgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55

Netgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55

Update: 2025-07-24
Share

Description

In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implications of Row Hammer attacks on memory integrity. They emphasize the need for organizations to implement compensating controls and monitor for potential threats, especially in the context of supply chain security and IoT devices.

 

Chapters

 

00:00 Introduction to Cybersecurity Challenges

02:20 Exploring Netgear's Role in Enterprise Security

09:08 The Impact of Shadow IT on Network Security

15:04 Firmware Integrity and Security Measures

18:05 Gigabyte's UEFI Vulnerabilities and Industry Implications

22:25 Understanding UEFI Vulnerabilities

28:46 Consumer vs. Enterprise Hardware Security

35:06 Monitoring and Mitigating Firmware Risks

41:11 The Impact of ECC on AI Performance

 

Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Netgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55

Netgear, Gigabyte, and Rowhammer Vulnerabilities - BTS #55

Paul Asadoorian