Tag: kernel

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/14/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-55591 Fortinet FortiOS Authorization Bypass Vulnerability CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability CVE-2025-21334 Microsoft Windows Hyper-V NT…

  • Microsoft Security Blog: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/ Source: Microsoft Security Blog Title: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions Feedly Summary: Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent…

  • Cisco Talos Blog: Exploring vulnerable Windows drivers

    Source URL: https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/ Source: Cisco Talos Blog Title: Exploring vulnerable Windows drivers Feedly Summary: This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about  malicious Windows drivers. AI Summary and Description: Yes Summary: The text provides an…

  • Cloud Blog: The 10 top Kubernetes Podcast episodes of 2024

    Source URL: https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-podcast-top-episodes-of-2024/ Source: Cloud Blog Title: The 10 top Kubernetes Podcast episodes of 2024 Feedly Summary: Here at the Kubernetes Podcast, we’ve been bringing you news and interviews from the Kubernetes and Cloud-Native technology space since 2019. And this year, Kubernetes turned 10 years old. We celebrated the milestone by focusing on open-source maintainers,…

  • Hacker News: Max GPU: A new GenAI native serving stac

    Source URL: https://www.modular.com/blog/introducing-max-24-6-a-gpu-native-generative-ai-platform Source: Hacker News Title: Max GPU: A new GenAI native serving stac Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the introduction of MAX 24.6 and MAX GPU, a cutting-edge infrastructure platform designed specifically for Generative AI workloads. It emphasizes innovations in AI infrastructure aimed at improving performance…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/12/16/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-20767 Adobe ColdFusion Improper Access Control Vulnerability CVE-2024-35250 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability These types of vulnerabilities are frequent attack…

  • Hacker News: The Qualcomm DSP Driver – Unexpectedly Excavating an Exploit

    Source URL: https://googleprojectzero.blogspot.com/2024/12/qualcomm-dsp-driver-unexpectedly-excavating-exploit.html Source: Hacker News Title: The Qualcomm DSP Driver – Unexpectedly Excavating an Exploit Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed technical analysis of multiple security vulnerabilities discovered in the adsprpc driver utilized in Qualcomm chips. Highlighting vulnerabilities that have direct implications for the security of…

  • Hacker News: Fast LLM Inference From Scratch (using CUDA)

    Source URL: https://andrewkchan.dev/posts/yalm.html Source: Hacker News Title: Fast LLM Inference From Scratch (using CUDA) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive overview of implementing a low-level LLM (Large Language Model) inference engine using C++ and CUDA. It details various optimization techniques to enhance inference performance on both CPU…

  • Hacker News: TCC and the macOS Platform Sandbox Policy

    Source URL: https://bdash.net.nz/posts/tcc-and-the-platform-sandbox-policy/ Source: Hacker News Title: TCC and the macOS Platform Sandbox Policy Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the Transparency, Consent, and Control (TCC) subsystem on macOS, outlining its functions in managing access to sensitive resources on the platform. It highlights the interplay between TCC and…