Rezultati pretraživanja
  1. 14. svi 2019.

    Also dropped today from TU Graz was . ZombieLoad uncovers a novel Meltdown-type effect in previously unexplored fill-buffer logic. is dedicated to this vuln, w/ FAQ. Paper here: Exploit POC here:

    Prikaži ovu nit
  2. 14. svi 2019.
    Prikaži ovu nit
  3. 17. svi 2019.

    It's true beer enhance skills, this is what my current fork of is able to do 😍 - 64 bytes leaked from /etc/shadow in ~3 minutes - leak url visited on a browser in the MacOS Host from Guest VM Should be clear how important is, to update cc

  4. 14. svi 2019.

    is no joke. It has multiple practical attack scenarios across CPU privilege rings, OS processes, VMs, and SGX enclaves. Disabling hyperthreading is the only possible workaround to prevent this extremely powerful attack on current processors.

    Prikaži ovu nit
  5. 12. stu 2019.

    The Transactional Asynchronous Abort (TAA) variant of has just been published. Read the full report in our Blog:

  6. 14. svi 2019.

    Read about how my team updated our side channel vulnerability mitigation architecture, HyperClear.

  7. 15. svi 2019.

    From the director of the award-winning "Meltdown & Spectre" and "Foreshadow" comes the new thriller "ZombieLoad", now in your nearest Intel CPU.

  8. 15. svi 2019.

    vulnerabilities impacting Intel Hardware 🧟‍♂️🚪

  9. 17. svi 2019.

    Using to leak the root password hash from /etc/shadow within a few minutes ( for high-resolution version in original speed)

    Prikaži ovu nit
  10. 14. svi 2019.

    : a new attack on CPUs leaking data which is currently loaded from memory - across programs, hyperthreads, SGX, and VMs. /cc

  11. 14. svi 2019.

    After and : TU Graz researchers discover new security flaws. impacts on the security of processors. Patches developed last year are ineffective, new updates will be necessary.

  12. 15. svi 2019.

    Very nice interactive diagram at Perhaps most telling is how many uncolored parts remain to be explored..

  13. 13. stu 2019.

    Install new security updates: Since an international team lead by discovered the processor loophole there has been a software patch and new processors. But with a new variant of the old attack these are no longer safe either:

  14. 14. svi 2019.

    When I grow up I want to work in the Exploit Marketing Department™

  15. 16. svi 2019.

    We have just released a dedicated security assessment for Intel’s Microarchitectural Data Sampling vulnerabilities (aka Zombieload) in

  16. 15. svi 2019.
  17. 14. svi 2019.
  18. 9. srp 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Totally Practical Attack: if you run this on the latest fully patched SGX enclave (with HT enabled) (), you can literally recover the shared secret of sgx_rijndael128GCM_encrypt using

  19. 15. svi 2019.

    We have catched three more zombies 🧟‍♀️🧟‍♂️🧟‍♀️ for the RuhrSec training about "Microarchitectural Attacks"; this training will be given by some of the authors of . Save one of the last seats to get your vaccination now! 💉

  20. 14. stu 2019.

    😮 8% reduction in performance for Cascade Lake with the new TAA mitigation (geometric mean of Ubuntu Linux performance tests) Holy crap that's a lot.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.