Is protecting against Meltdown and Spectre on virtual servers actually possible?

I’ve been reading into the Meltdown and Spectre bugs recently and the issues they cause for virtualised servers, as memory in one VM can potentially be accessed by another user in a separate VM with the same host.
I found this article on D… Continue reading Is protecting against Meltdown and Spectre on virtual servers actually possible?

Malware spammers aim to leverage Kaseya ransomware drama in email campaign

First came the ransomware rampage stemming from the breach of Miami-based software firm Kaseya. Now comes a wave of malicious emails seeking capitalize on the rush to find a fix. Security vendor MalwareBytes highlighted the malware spam campaign Tuesday, describing how unidentified attackers send “malspam” messages with both a URL and a file that purports to be a Microsoft update of the Kaseya VSA vulnerability. Clicking on the the link, or “SecurityUpdates.exe,” drops Cobalt Strike on a victim. Cybercriminals have increasingly leveraged that security testing tool for attacks, according to recent research. It’s another example of how cyberattacks can have long tails after their initial infections. The zero-day vulnerability that the ransomware gang REvil apparently used to infiltrate Kaseya systems turned into a way for intruders to access the systems of Kaseya’s managed service provider customers, who provide IT services to a wider range of potential victims. It has turned […]

The post Malware spammers aim to leverage Kaseya ransomware drama in email campaign appeared first on CyberScoop.

Continue reading Malware spammers aim to leverage Kaseya ransomware drama in email campaign

Are there any class of systems where it is safe to disable spectre and meltdown patches

I was not able to find a definite answer to the question whether it is safe to disable spectre and meltdown vulnerabilities but i could articles that suggests the defaults might be revisited & windows seems to allow the disabling of th… Continue reading Are there any class of systems where it is safe to disable spectre and meltdown patches

This Week in Security: BYOVD, Spectre Vx, More Octal Headaches, and ExifTool

I learned a new acronym while reading about a set of flaws in the Dell BIOS update system. Because Dell has patched their driver, but hasn’t yet revoked the signing …read more Continue reading This Week in Security: BYOVD, Spectre Vx, More Octal Headaches, and ExifTool

Specter of Spectre is Back, in New Micro-Op Cache Vuln

It’s been three years, but now researchers have disclosed new attacks on speculative execution in Intel and AMD chips.
The post Specter of Spectre is Back, in New Micro-Op Cache Vuln appeared first on Security Boulevard.
Continue reading Specter of Spectre is Back, in New Micro-Op Cache Vuln

Microsoft’s new ‘Pluton’ security processor gets buy-in from Intel, AMD

Microsoft and three major computing vendors — AMD, Intel and Qualcomm Technologies — on Tuesday said they would produce security chips designed to keep attackers from stealing critical data such as encryption keys and credentials from computing systems. The goal is to guard against a relatively new breed of attack techniques, made famous by the 2018 Spectre and Meltdown vulnerabilities, that pry data from a computer’s most sensitive enclaves. To do this, Microsoft said it will store critical data on the chip itself, isolating it from the rest of the system. Advocates of the new security chip, known as Pluton, say it will cut off a key vector for data-stealing attacks: a communication channel between a computing system’s central processing unit (CPU) and another piece of hardware known as the trusted platform module (TPM). In one example of that type of attack, researchers from security company NCC Group in 2018 […]

The post Microsoft’s new ‘Pluton’ security processor gets buy-in from Intel, AMD appeared first on CyberScoop.

Continue reading Microsoft’s new ‘Pluton’ security processor gets buy-in from Intel, AMD

Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips

Intel’s addition of memory encryption to its upcoming 3rd generation Xeon Scalable processors matches AMD’s Secure Memory Encryption (SME) feature. Continue reading Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips

BlindSide: Intel/AMD Speculation Bugs Under Microscope Again

Researchers have published frightening details on what they’re calling BlindSide, which relies on co-opting our old friend speculative execution.
The post BlindSide: Intel/AMD Speculation Bugs Under Microscope Again appeared first on Security Boulevar… Continue reading BlindSide: Intel/AMD Speculation Bugs Under Microscope Again