Extracting encryption keys from RAM by rapidly cooling memory chips before a standard reset.
Persistent malware residing in the UEFI firmware, surviving OS reinstallations and disk wipes.
Container breakout via kernel vulnerability, allowing lateral movement into the cloud control plane.