CISA has added three new vulnerabilities to its KEV Catalog, based on evidence of active exploitation.| Cybersecurity and Infrastructure Security Agency CISA
NVIDIA websites use cookies to deliver and improve the website experience. See our cookie policy for further details on how we use cookies and how to change your cookie settings.| NVIDIA
Eclypsium Research discusses critical vulnerabilities in American Megatrends (AMI) MegaRAC Baseboard Management Controller (BMC) software, affecting millions of devices. These vulnerabilities enable unauthenticated remote code execution and unauthorized device access.| Eclypsium | Supply Chain Security for the Modern Enterprise
Verizon DBIR 2025 Key Stats: Network Device Attacks, Third Party Risk, and More Massive shifts in cyber attack behavior have been revealed in the 2025 Verizon Data Breach Investigation Report (DBIR). Here are a few of the most surprising stats with real world implications for cybersecurity strategy and attack surface management. Network Device and Edge […]| Eclypsium | Supply Chain Security for the Modern Enterprise
Last week CISA took a major step in the fight against ransomware and state-sponsored attacks by issuing Binding Operational Directive 23-02. This directive directly calls out an area where threat actors are the most active and successful in the wild—the exploitation of network infrastructure appliances such as VPNs, switches, routers, and firewalls as well as […]| Eclypsium | Supply Chain Security for the Modern Enterprise
Eclypsium Research has discovered and reported 5 vulnerabilities in AMI MegaRAC Baseboard Management Controller (BMC) software. MegaRAC BMC is widely used by many leading server manufacturers to provide “lights-out” management capabilities for their server products.| Eclypsium | Supply Chain Security for the Modern Enterprise
Secure the hardware and firmware of AI data centers at the foundations, from the supply chain to secure decommissioning of devices. AI is the defining competition| Eclypsium | Supply Chain Security for the Modern Enterprise
Network devices were impacted by over 50% of the most routinely exploited vulnerabilities in 2023, and most were zero days.| Eclypsium | Supply Chain Security for the Modern Enterprise
AI is now critical infrastructure—and its foundation is under attack. As the global AI arms race accelerates, nation-state hackers are targeting the hardware, firmware, and supply chains powering AI data centers and neocloud platforms. In this webinar, we’ll explore the escalating risks, the rapid buildout of AI infrastructure, and how IT supply chain security can protect the core technologies driving today’s most advanced workloads.| Eclypsium | Supply Chain Security for the Modern Enterprise
Get insights on how to protect supply chain security for your enterprise infrastructure with Eclypsium.| Eclypsium | Supply Chain Security for the Modern Enterprise
The Eclypsium research team has discovered a previously unknown remotely exploitable vulnerability in AMI’s MegaRAC software that allows attackers to bypass authentication remotely.| Eclypsium | Supply Chain Security for the Modern Enterprise