chip

BadRAM: $10 hack unlocks AMD encrypted memory

BadRAM: $10 hack unlocks AMD encrypted memory 2024-12-11 at 13:16 By Mirko Zorz Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules to unlock the chips’ encrypted memory. The SPD chip can be modified using an off-the-shelf microcontroller. The researchers used a Raspberry Pi […]

React to this headline:

Loading spinner

BadRAM: $10 hack unlocks AMD encrypted memory Read More »

Qualcomm zero-day under targeted exploitation (CVE-2024-43047)

Qualcomm zero-day under targeted exploitation (CVE-2024-43047) 2024-10-08 at 15:31 By Zeljka Zorz An actively exploited zero-day vulnerability (CVE-2024-43047) affecting dozens of Qualcomm’s chipsets has been patched by the American semiconductor giant. About CVE-2024-43047 On Monday, Qualcomm has confirmed patches for 20 vulnerabilities affecting both proprietary and open source software running on its various chipsets. Among

React to this headline:

Loading spinner

Qualcomm zero-day under targeted exploitation (CVE-2024-43047) Read More »

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor 2024-04-29 at 13:46 By Help Net Security Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry research team led

React to this headline:

Loading spinner

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor Read More »

As biohacking evolves, how vulnerable are we to cyber threats?

As biohacking evolves, how vulnerable are we to cyber threats? 12/10/2023 at 07:01 By Help Net Security Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to Entelgy. However, despite more than a decade

React to this headline:

Loading spinner

As biohacking evolves, how vulnerable are we to cyber threats? Read More »

Scroll to Top