Security News
In three posts marked urgent to the Linux kernel mailing list on Tuesday, Anthony Steinhauser points out problems with countermeasures put in place to block Spectre vulnerabilities in modern Intel and AMD x86 microprocessors that perform speculative execution. The Spectre family of flaws involve making a target system speculate - perform an operation it may not need - in order to expose confidential data so an attacker can obtain it through an unprotected side channel.
Ignore the overhead, enjoy Site Isolation – a defense against side-channel attacks Last year, Google deployed Site Isolation in desktop versions of its Chrome browser as a defense against CPU...
Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.
Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. The SWAPGS Attack,...
SWAPGS can be abused to siphon sensitive secrets from kernel memory, patches already available Spectre – a family of data-leaking side-channel vulnerabilities arising from speculative execution...
SWAPGS attack can leak sensitive secrets from kernel memory, patches already available Spectre – a family of data-leaking side-channel vulnerabilities arising from speculative execution that was...
OpenSSH, a widely used suite of programs for secure (SSH protocol-based) remote login, has been equipped with protection against side-channel attacks that could allow attackers to extract private...
A lot of thought and meaning goes into the naming of infamous CPU side channel flaws, like ZombieLoad, Spectre and Meltdown.
Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.
Intel has disclosed a new class of speculative execution side channel attacks.