Tag: hardware-based security

  • Slashdot: Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks

    Source URL: https://it.slashdot.org/story/25/10/01/229239/intel-and-amd-trusted-enclaves-a-foundation-for-network-security-fall-to-physical-attacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks Feedly Summary: AI Summary and Description: Yes Summary: Researchers have introduced two significant hardware attacks, Battering RAM and Wiretap, that compromise Intel SGX and AMD SEV-SNP trusted enclaves. These attacks exploit flaws in deterministic encryption…

  • The Register: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

    Source URL: https://www.theregister.com/2025/09/12/hopefully_just_a_poc_hybridpetya/ Source: The Register Title: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend Feedly Summary: Although it hasn’t been seen in the wild yet A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked…

  • Cisco Talos Blog: ReVault! When your SoC turns against you… deep dive edition

    Source URL: https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you-2/ Source: Cisco Talos Blog Title: ReVault! When your SoC turns against you… deep dive edition Feedly Summary: Talos reported 5 vulnerabilities to Broadcom and Dell affecting both the ControlVault3 Firmware and its associated Windows APIs that we are calling “ReVault”.  AI Summary and Description: Yes **Summary:** The text conducts an in-depth analysis…

  • Cloud Blog: How SUSE and Google Cloud collaborate on Confidential Computing

    Source URL: https://cloud.google.com/blog/products/identity-security/how-suse-and-google-cloud-collaborate-on-confidential-computing/ Source: Cloud Blog Title: How SUSE and Google Cloud collaborate on Confidential Computing Feedly Summary: Securing sensitive data is a crucial part of moving workloads to the cloud. While encrypting data at rest and in transit are standard security practices, safeguarding data in use — while it’s actively being processed in memory…

  • Hacker News: Apple rearranged its XNU kernel with exclaves

    Source URL: https://www.theregister.com/2025/03/08/kernel_sanders_apple_rearranges_xnu/ Source: Hacker News Title: Apple rearranged its XNU kernel with exclaves Feedly Summary: Comments AI Summary and Description: Yes Summary: Apple is enhancing the security of its XNU kernel through the introduction of “exclaves,” which create isolated domains that enhance protection against kernel compromises. This architectural shift aims to combine the advantages…

  • Hacker News: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)

    Source URL: https://www.xstore.co.za/stuff/2024/01/kaspersky-finds-hardware-backdoor-in-5-generations-of-apple-silicon/ Source: Hacker News Title: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security concern regarding a hardware backdoor found in Apple’s silicon. Identified as CVE-2023-38606, this vulnerability reportedly affects five generations of Apple mobile CPUs,…

  • The Register: Microsoft confirms there will be no U-turn on Windows 11 hardware requirements

    Source URL: https://www.theregister.com/2024/12/04/microsoft_windows_11_tpm/ Source: The Register Title: Microsoft confirms there will be no U-turn on Windows 11 hardware requirements Feedly Summary: TPM 2.0 ‘non-negotiable’ for latest OS, says software giant Microsoft is not backing down on the hardware requirements for Windows 11, stating that the Trusted Platform Module (TPM) is essential for the operating system,…

  • CSA: Fully Homomorphic Encryption vs Confidential Computing

    Source URL: https://cloudsecurityalliance.org/blog/2024/08/22/understanding-the-differences-between-fully-homomorphic-encryption-and-confidential-computing Source: CSA Title: Fully Homomorphic Encryption vs Confidential Computing Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Fully Homomorphic Encryption (FHE) and Confidential Computing, two innovative technologies aimed at enhancing data security and privacy. It highlights their distinct approaches to protecting sensitive data during processing, their unique characteristics, and…