Rezultati pretraživanja
  1. 18. sij 2019.

    SGX-Step v1.3 released! Open-source enclave side-channel attack framework now supports transient execution attacks.

  2. 17. kol 2018.

    New threat ! Read more about How to fix in VMware vSphere environments. Automated checks are available in Runecast Analyzer 1.8!

  3. 14. kol 2018.

    Please see for information about the L1 Terminal Fault ( ) This affects: CVE-2018-3646 CVE-2018-3620 CVE-2018-3615

    Prikaži ovu nit
  4. 14. kol 2018.

    It has been a while...time for the next round of vulnerabilities: L1 Terminal Fault:

    Prikaži ovu nit
  5. 16. kol 2018.

    Sent this message to our TAM regarding "L1 Terminal Fault" . Looking forward to an answer ...

    Prikaži ovu nit
  6. 15. kol 2018.

    Theo de Raadt on the impact of the Intel on . “We asked repeatedly, but Intel provided no advance notice. We did not even receive replies to our requests for dialogue. On a side note, AMD cpus are not vulnerable to this problem.”

  7. 14. kol 2018.

    Hugely grateful that released these PowerShell scripts for the new bug. Has made today a lot easier.

  8. 15. kol 2018.

    Thank you for these amazing PowerShell scripts for the new bug. Going to make life much simpler going forward!

  9. 14. kol 2018.

    Great explanation of what's happening with the new Intel vulnerability L1 Terminal Fault from Red Hat's chief ARM architect,

  10. 19. kol 2018.

    I updated the mind map on Intel CPU Speculative Execution security issues. All contents of previous vulnerabilities were checked/refreshed and latest L1 Terminal Fault () was added.

    Prikaži ovu nit
  11. Disable SMT/Hyperthreading in all Intel BIOSes:

  12. 18. ruj 2018.
  13. 14. kol 2018.

    FreeBSD bhyve fix for from of the - freebsd-update coming shortly

  14. 14. svi 2019.

    Where does Microarchitectural Data Sampling fit in terms of , and ? Learn about how these lessons apply to the newest processor-level security vulnerability at

  15. 20. kol 2018.

    leaks memory in a similar way to but even from a virtual machine (here: QEMU KVM). It circumvents , re-enabling many attacks, e.g., stealing passwords /cc

  16. 14. kol 2018.
    Prikaži ovu nit
  17. 28. pro 2018.

    Join our "Christmas Carol: The Spectres of the Past, Present, and Future" with . Come see it at 8:50pm in room Clarke or join in online at

  18. 20. kol 2018.

    Got a lot of questions around and it's impact on scalability of VDI environments.. so decided to do some tests: . I think you will notice this impact... More results to follow.

  19. The steady lack of panic, outrage and confusion over / is evidence to me that the multi-party coordinated disclosure was effective and useful.

  20. Cute combination of Spectre-v1 and L1TF: (speculative execution beyond a bounds check to fill into the cache during VMExit then L1TF to leak the secrets)

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.