Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass a system’s security meas…
First seen on gbhackers.com
Jump to article: gbhackers.com/pkfail-firmware-supply-chain-vulnerability/