Tag: hardware-based security

  • Cisco Talos Blog: ReVault! When your SoC turns against you… deep dive edition

    Source URL: https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you-2/ Source: Cisco Talos Blog Title: ReVault! When your SoC turns against you… deep dive edition Feedly Summary: Talos reported 5 vulnerabilities to Broadcom and Dell affecting both the ControlVault3 Firmware and its associated Windows APIs that we are calling “ReVault”.  AI Summary and Description: Yes **Summary:** The text conducts an in-depth analysis…

  • Cloud Blog: How SUSE and Google Cloud collaborate on Confidential Computing

    Source URL: https://cloud.google.com/blog/products/identity-security/how-suse-and-google-cloud-collaborate-on-confidential-computing/ Source: Cloud Blog Title: How SUSE and Google Cloud collaborate on Confidential Computing Feedly Summary: Securing sensitive data is a crucial part of moving workloads to the cloud. While encrypting data at rest and in transit are standard security practices, safeguarding data in use — while it’s actively being processed in memory…

  • Hacker News: Apple rearranged its XNU kernel with exclaves

    Source URL: https://www.theregister.com/2025/03/08/kernel_sanders_apple_rearranges_xnu/ Source: Hacker News Title: Apple rearranged its XNU kernel with exclaves Feedly Summary: Comments AI Summary and Description: Yes Summary: Apple is enhancing the security of its XNU kernel through the introduction of “exclaves,” which create isolated domains that enhance protection against kernel compromises. This architectural shift aims to combine the advantages…

  • Hacker News: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)

    Source URL: https://www.xstore.co.za/stuff/2024/01/kaspersky-finds-hardware-backdoor-in-5-generations-of-apple-silicon/ Source: Hacker News Title: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security concern regarding a hardware backdoor found in Apple’s silicon. Identified as CVE-2023-38606, this vulnerability reportedly affects five generations of Apple mobile CPUs,…

  • The Register: Microsoft confirms there will be no U-turn on Windows 11 hardware requirements

    Source URL: https://www.theregister.com/2024/12/04/microsoft_windows_11_tpm/ Source: The Register Title: Microsoft confirms there will be no U-turn on Windows 11 hardware requirements Feedly Summary: TPM 2.0 ‘non-negotiable’ for latest OS, says software giant Microsoft is not backing down on the hardware requirements for Windows 11, stating that the Trusted Platform Module (TPM) is essential for the operating system,…

  • CSA: Fully Homomorphic Encryption vs Confidential Computing

    Source URL: https://cloudsecurityalliance.org/blog/2024/08/22/understanding-the-differences-between-fully-homomorphic-encryption-and-confidential-computing Source: CSA Title: Fully Homomorphic Encryption vs Confidential Computing Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Fully Homomorphic Encryption (FHE) and Confidential Computing, two innovative technologies aimed at enhancing data security and privacy. It highlights their distinct approaches to protecting sensitive data during processing, their unique characteristics, and…