
Virtual-machine escape – in a Spectre v2 attack
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
8 articles
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
How a recently discovered bug in Intel processors threatens cloud providers.
Explaining an issue in popular PC and server CPUs in simple terms.
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
Stealing data from an isolated network by manipulating the voltage switching converter.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?