• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

UEFI bootkit

>> With this in mind, we see that UEFI continues to be a point of interest to APT actors, while at large being overlooked by security vendors.

I often wondered why we didn't see more firmware malware out there. Perhaps because it varies between different firmware vendors, but I could see this becoming more of an issue if computer manufacturers look for more and more elaborate codebases in firmware to be able to do things outside of the OS. I do think the bigger target will be towards mobile devices in the next 10 years.

/r