• Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Use Case
        • Device Lifecycle Security
        • Firmware Security
        • Hardware Supply Chain Security
        • Regulatory Compliance
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        Fortinet Under Fire: Why Your Network Edge Remains Attackers' Favorite Entry Point

        Learn more
        Blog

        2025: The Year of Network Device Exploitation Adds Three More

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact
  • US
  • JP
  • Get a demo
  • Take a Tour
  • US
  • JP
  • Get a demo
  • Take a Tour
  • Platform
      • Platform Overview
      • Protect critical software, firmware, and hardware in enterprise and national infrastructure.
      • Learn More
      • Eclypsium Protects:
        • User Endpoints
        • Servers
        • Network Devices
        • AI Hardware
      • Featured post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Solutions
      • Solutions Overview
      • Build trust in every critical asset in your enterprise.
      • Read More
      • By Use Case
        • Device Lifecycle Security
        • Firmware Security
        • Hardware Supply Chain Security
        • Regulatory Compliance
        • Zero Trust
          for Endpoints
      • By Industry
        • Energy and Utilities
        • Financial Services
        • Government
        • Telecommunications
      • Featured Post
        Take an interactive tour of the Eclypsium platform.
        Take a Tour
  • Resources
      • All Resources
      • Learn More
      • Case Studies
      • Demos & Videos
      • Events & Webinars
      • Podcasts
      • Solution Briefs
      • Reports and eBooks
      • White Papers
      • Blog
      • Newsletter
      • Support
      • Latest Blogs
        Blog

        Fortinet Under Fire: Why Your Network Edge Remains Attackers' Favorite Entry Point

        Learn more
        Blog

        2025: The Year of Network Device Exploitation Adds Three More

        Learn more
  • Research
  • Company
      • Company Overview
      • We exist to defend the foundation of enterprise and national infrastructure.
      • Learn More
      • Team
      • Newsroom
      • Careers
      • Partners
      • Security and Trust
      • Contact

Eclypsium Security Advisories

  1. https://eclypsium.com/blog/bombshell-the-signed-backdoor-hiding-in-plain-sight-on-framework-devices/
  2. https://eclypsium.com/blog/badcam-now-weaponizing-linux-webcams/
  3. https://eclypsium.com/blog/smm-callout-vulnerabilities-in-uefi/
  4. https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/ 
  5. https://eclypsium.com/blog/genetic-engineering-meets-reverse-engineering-dna-sequencers-vulnerable-bios/ 
  6. https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
  7. https://eclypsium.com/blog/dont-play-with-fire-prioritize-zyxel-firewall-update-to-fix-unreported-vulnerability/
  8. https://eclypsium.com/blog/protecting-rugged-gear-from-uefi-threats-and-secure-boot-vulnerabilities/
  9. https://eclypsium.com/research/bmcc-lights-out-forever/ 
  10. https://eclypsium.com/research/pwned-balancers-commandeering-f5-and-citrix-for-persistent-access-c2/
  11. https://eclypsium.com/research/one-bootloader-to-load-them-all/
  12. https://eclypsium.com/research/eclypsium-discovers-multiple-vulnerabilities-affecting-129-dell-models-via-dell-remote-os-recovery-and-firmware-update-capabilities/
  13. https://eclypsium.com/research/theres-a-hole-in-the-boot/
  14. https://eclypsium.com/research/screwed-drivers-signed-sealed-delivered/
  15. https://eclypsium.com/research/vulnerable-firmware-in-the-supply-chain-of-enterprise-servers/
  16. https://eclypsium.com/research/firmware-vulnerabilities-in-supermicro-systems/ 
Eclypsium | Supply Chain Security for the Modern Enterprise
Get a Demo Contact Us
Platform
  • Title
    • Supply Chain Security
    • Supply Chain Intelligence
Research
Solutions
  • Title
    • Digital Supply Chain Security
    • Firmware Protection for Enterprises
    • Compliance
    • Zero Trust for Endpoints
Resources
  • Title
    • Blog
    • Events
    • Podcasts
    • White Papers
    • Support
  • Title
    • Solution Briefs
    • Threat Reports
    • Newsletter
Company
  • Title
    • Team
    • Newsroom
    • Careers
    • Partners
    • Security
    • Contact
  • Linkedin
  • Youtube
  • Twitter
  • Facebook
© 2025 Eclypsium, Inc.
Privacy Policy | Terms of Use | Sitemap