Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Two New Vulnerabilities Discovered in TPM 2.0 Library

Threat Level – Amber | Vulnerability Report
Download PDF

The Trusted Platform Module (TPM) 2.0 specification, a hardware-based technology used to provide tamper-resistant secure cryptographic functions, is affected by two buffer overflow vulnerabilities. These vulnerabilities could allow attackers to access or overwrite sensitive data, such as cryptographic keys.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox