Common Information
Type | Value |
---|---|
Value |
Firmware - T1592.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.). Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).(Citation: ArsTechnica Intel) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2031-03-19 | 15 | HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support | ||
Details | Website | 2024-12-28 | 0 | BRICKED SSD ON LIFE SUPPORT — FMADIO | ||
Details | Website | 2024-11-17 | 0 | "Navigating the future of digital security: How evolving threats, advanced AI, and new protection… | ||
Details | Website | 2024-11-17 | 3 | LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for | ||
Details | Website | 2024-11-16 | 0 | Best Practices for Maintaining Cybersecurity in a Home Office | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Tips for Digital Safety | ||
Details | Website | 2024-11-16 | 0 | How Internet Security Protects You from Cyber Threats | ||
Details | Website | 2024-11-15 | 0 | Understanding the GeoVision Zero-Day Exploit and Mirai Malware Botnet | ||
Details | Website | 2024-11-15 | 12 | Cybersecurity News Review — Week 46 | ||
Details | Website | 2024-11-15 | 0 | Marvis Client provides device-to-cloud visibility to optimize Wi-Fi experiences | Official Juniper Networks Blogs | ||
Details | Website | 2024-11-15 | 2 | Critical TP-Link DHCP Vulnerability Let Attackers Execute Remote Code | ||
Details | Website | 2024-11-15 | 0 | NIST Reveals 98 Ways Your Hardware Can Be Hacked | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Safeguarding Healthcare Organizations from IoMT Risks | ||
Details | Website | 2024-11-15 | 5 | The Good, the Bad and the Ugly in Cybersecurity - Week 46 | ||
Details | Website | 2024-11-15 | 0 | Guardians of Patient Data: A Cybersecurity Checklist for Small Healthcare Providers | ||
Details | Website | 2024-11-15 | 13 | Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 | ||
Details | Website | 2024-11-14 | 0 | Revisiting Battery Safety | ||
Details | Website | 2024-11-14 | 0 | Why IoT Device Security Matters: Protecting Your Smart Devices | ||
Details | Website | 2024-11-14 | 3 | Angriffserkennung in der OT: Wie geht das? | ||
Details | Website | 2024-11-13 | 0 | Cybersecurity in the Age of IoT: Threats and Solutions | ||
Details | Website | 2024-11-13 | 0 | 2024’s Most Common Cyber Threats and How to Defend Against Them | ||
Details | Website | 2024-11-13 | 0 | How to Protect Yourself and Your Business from Cyber Attacks in 2025 | ||
Details | Website | 2024-11-13 | 7 | These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER |