mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.8K
active users

#spectre

2 posts2 participants0 posts today
ChelseaRolls-Royce Spectre: A Floral Tribute in Chelsea’s Luxury Scene Rolls-Royce Motor Cars’ ongoi...<br><br><a href="https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene" rel="nofollow noopener noreferrer" target="_blank">https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene</a><br><br><a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/NEWS" target="_blank">#NEWS</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Chelsea" target="_blank">#Chelsea</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Rolls-Royce" target="_blank">#Rolls-Royce</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Motor" target="_blank">#Motor</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Cars" target="_blank">#Cars</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Spectre" target="_blank">#Spectre</a><br><br><a href="https://awakari.com/pub-msg.html?id=FZ8LYZmtgt5Fmcg4Xtveh8LHH0q&amp;interestId=Chelsea" rel="nofollow noopener noreferrer" target="_blank">Result Details</a>
ChelseaRolls-Royce Spectre: A Floral Tribute in Chelsea’s Luxury Scene Rolls-Royce Motor Cars’ ongoi...<br><br><a href="https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene" rel="nofollow noopener noreferrer" target="_blank">https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene</a><br><br><a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/NEWS" target="_blank">#NEWS</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Chelsea" target="_blank">#Chelsea</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Rolls-Royce" target="_blank">#Rolls-Royce</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Motor" target="_blank">#Motor</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Cars" target="_blank">#Cars</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Spectre" target="_blank">#Spectre</a><br><br><a href="https://awakari.com/pub-msg.html?id=VVBd6wAi1IYhenL08FdQjlrF76u&amp;interestId=Chelsea" rel="nofollow noopener noreferrer" target="_blank">Result Details</a>
ChelseaRolls-Royce Spectre: A Floral Tribute in Chelsea’s Luxury Scene Rolls-Royce Motor Cars’ ongoi...<br><br><a href="https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene" rel="nofollow noopener noreferrer" target="_blank">https://autoscommunity.com/2025/05/22/rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rolls-royce-spectre-a-floral-tribute-in-chelseas-luxury-scene</a><br><br><a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/NEWS" target="_blank">#NEWS</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Chelsea" target="_blank">#Chelsea</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Rolls-Royce" target="_blank">#Rolls-Royce</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Motor" target="_blank">#Motor</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Cars" target="_blank">#Cars</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/Spectre" target="_blank">#Spectre</a><br><br><a href="https://awakari.com/pub-msg.html?id=HeRXIXum6uR9l6hpPHx76kIfikK&amp;interestId=Chelsea" rel="nofollow noopener noreferrer" target="_blank">Result Details</a>
Habr<p>Security Week 2521: Spectre-подобная уязвимость в процессорах Intel</p><p>На прошлой неделе исследователи из Швейцарской высшей технической школы Цюриха (ETH Zurich) опубликовали детали новой аппаратной уязвимости, затрагивающей процессоры Intel шести поколений начиная с 2018 года. Новое исследование стало логическим продолжением предыдущей работы (мы писали о ней здесь ), в которой была предложена атака Retbleed. Новая атака, получившая название Branch Privilege Injection, также нацелена на обход защитных механизмов, предложенных после обнаружения уязвимости Spectre v2 еще в 2017 году. Spectre v2 эксплуатирует «фичу» всех современных процессоров, обеспечивающую спекулятивное выполнение инструкций еще до того, как был получен результат предыдущих вычислений. Как выяснилось в 2017 году, это открывает возможность чтения данных из защищенных областей оперативной памяти. Механизм предсказания ветвлений можно натренировать так, что секретная (обычно недоступная атакующему) информация будет загружена в кэш-память процессора и считана оттуда «по стороннему каналу». Новая работа исследователей ETH Zurich демонстрирует, как можно обойти сразу два разных метода, направленных на защиту от Spectre-подобных атак, реализовав состояние гонки в работе предсказателя ветвлений.</p><p><a href="https://habr.com/ru/companies/kaspersky/articles/910664/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/kaspersk</span><span class="invisible">y/articles/910664/</span></a></p><p><a href="https://zhub.link/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://zhub.link/tags/intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intel</span></a> <a href="https://zhub.link/tags/bprc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bprc</span></a></p>
theruran 💻 🌐 :cereal_killer:<p>"Training Solo: New Set Of Serious Security Vulnerabilities Exposed For Intel &amp; Arm CPUs"</p><p><a href="https://www.phoronix.com/news/Training-Solo-Vulnerability" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Training-Sol</span><span class="invisible">o-Vulnerability</span></a><br><a href="https://www.vusec.net/projects/training-solo/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vusec.net/projects/training-so</span><span class="invisible">lo/</span></a><br><a href="https://github.com/vusec/training-solo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/vusec/training-solo</span><span class="invisible"></span></a></p><p><a href="https://masto.hackers.town/tags/infoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoSec</span></a> <a href="https://masto.hackers.town/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://masto.hackers.town/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://masto.hackers.town/tags/Arm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arm</span></a></p>
Pyrzout :vm:<p>This Week in Security: Lingering Spectre, Deep Fakes, and CoreAudio <a href="https://hackaday.com/2025/05/16/this-week-in-security-lingering-spectre-deep-fakes-and-coreaudio/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/05/16/this-w</span><span class="invisible">eek-in-security-lingering-spectre-deep-fakes-and-coreaudio/</span></a> <a href="https://social.skynetcloud.site/tags/ThisWeekinSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThisWeekinSecurity</span></a> <a href="https://social.skynetcloud.site/tags/HackadayColumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackadayColumns</span></a> <a href="https://social.skynetcloud.site/tags/SecurityHacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityHacks</span></a> <a href="https://social.skynetcloud.site/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CVEs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVEs</span></a> <a href="https://social.skynetcloud.site/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
IT News<p>This Week in Security: Lingering Spectre, Deep Fakes, and CoreAudio - Spectre lives. We’ve got two separate pieces of research, each finding new process... - <a href="https://hackaday.com/2025/05/16/this-week-in-security-lingering-spectre-deep-fakes-and-coreaudio/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/05/16/this-w</span><span class="invisible">eek-in-security-lingering-spectre-deep-fakes-and-coreaudio/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://schleuss.online/tags/cves" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cves</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
sekurak News<p>Nowe luki w procesorach Intel: powrót do problemów Spectre i Meltdown w nowej odsłonie</p><p>Nowe luki w procesorach Intel umożliwiające wycieki pamięci i ataki Spectre v2 zostały ujawnione przez badaczy z ETH Zürich i Vrije Universiteit Amsterdam. Odkrycia te pokazują, że pomimo siedmiu lat od ujawnienia podatności Spectre i Meltdown, problemy związane ze spekulacyjnym wykonaniem instrukcji wciąż stanowią poważne zagrożenie. Badacze zidentyfikowali trzy kluczowe...</p><p><a href="https://mastodon.com.pl/tags/WBiegu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WBiegu</span></a> <a href="https://mastodon.com.pl/tags/Bpi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bpi</span></a> <a href="https://mastodon.com.pl/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://mastodon.com.pl/tags/Meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meltdown</span></a> <a href="https://mastodon.com.pl/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://mastodon.com.pl/tags/TrainingSolo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrainingSolo</span></a></p><p><a href="https://sekurak.pl/nowe-luki-w-procesorach-intel-powrot-do-problemow-spectre-i-meltdown-w-nowej-odslonie/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sekurak.pl/nowe-luki-w-proceso</span><span class="invisible">rach-intel-powrot-do-problemow-spectre-i-meltdown-w-nowej-odslonie/</span></a></p>
WinFuture.de<p>Nach Jahren werden <a href="https://mastodon.social/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a>-<a href="https://mastodon.social/tags/CPUs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPUs</span></a> immer noch von der <a href="https://mastodon.social/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a>-<a href="https://mastodon.social/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücke</span></a> geplagt. Forscher fanden jetzt einen neuen Weg, um alle bisherigen Sicherheitsmaßnahmen auszuhebeln. <a href="https://winfuture.de/news,150944.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,150944.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a>: Ein weiterer Angriff umgeht alle bisherigen <a href="https://social.tchncs.de/tags/CPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPU</span></a>-Schutzmaßnahmen | Security <a href="https://www.heise.de/news/Intel-Ein-weiterer-Angriff-umgeht-alle-bisherigen-CPU-Schutzmassnahmen-10383474.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Intel-Ein-weiter</span><span class="invisible">er-Angriff-umgeht-alle-bisherigen-CPU-Schutzmassnahmen-10383474.html</span></a> <a href="https://social.tchncs.de/tags/IntelCPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IntelCPU</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/ETHZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETHZ</span></a> <a href="https://social.tchncs.de/tags/ETHzurich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETHzurich</span></a> <a href="https://social.tchncs.de/tags/BranchPredictorRaceConditions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BranchPredictorRaceConditions</span></a> <a href="https://social.tchncs.de/tags/BPRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BPRC</span></a> <a href="https://social.tchncs.de/tags/BranchPrivilegeInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BranchPrivilegeInjection</span></a> <a href="https://social.tchncs.de/tags/BPI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BPI</span></a> <a href="https://social.tchncs.de/tags/comsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>comsec</span></a> <a href="https://social.tchncs.de/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://social.tchncs.de/tags/Meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meltdown</span></a></p>
:puppybasketball: :v03:<p><a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> experts have discovered new <a href="https://mas.to/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://mas.to/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> :devastated:</p><p><a href="https://www.ghacks.net/2025/05/14/security-experts-have-discovered-new-intel-spectre-vulnerabilities/?utm_source=mas.to&amp;utm_medium=social&amp;utm_campaign=&amp;utm_term=&amp;utm_content=&amp;utm_referrer=https%3A%2F%2Fmas.to%2F%40KNTRO&amp;utm_id=&amp;utm_creative=&amp;utm_channel=mastodon_organic&amp;utm_platform=desktop&amp;utm_location=argentina&amp;utm_language=es-ar&amp;utm_variant=" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ghacks.net/2025/05/14/security</span><span class="invisible">-experts-have-discovered-new-intel-spectre-vulnerabilities/?utm_source=mas.to&amp;utm_medium=social&amp;utm_campaign=&amp;utm_term=&amp;utm_content=&amp;utm_referrer=https%3A%2F%2Fmas.to%2F%40KNTRO&amp;utm_id=&amp;utm_creative=&amp;utm_channel=mastodon_organic&amp;utm_platform=desktop&amp;utm_location=argentina&amp;utm_language=es-ar&amp;utm_variant=</span></a></p><p><a href="https://mas.to/tags/ETHZurich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETHZurich</span></a> <a href="https://mas.to/tags/BranchPredictionRaceConditions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BranchPredictionRaceConditions</span></a> <a href="https://mas.to/tags/BPRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BPRC</span></a> <a href="https://mas.to/tags/CoffeeLakeRefresh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoffeeLakeRefresh</span></a> <a href="https://mas.to/tags/KabyLake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KabyLake</span></a> <a href="https://mas.to/tags/BranchPrivilegeInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BranchPrivilegeInjection</span></a> <a href="https://mas.to/tags/BPI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BPI</span></a> <a href="https://mas.to/tags/AlderLake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlderLake</span></a></p>
Marcel Waldvogel<p>Das kann schief gehen. Und das Aufräumen der fälschlich angefangenen Arbeiten ist nicht perfekt (Cache). Die CPU-Hersteller versuchen diese Lücken einzudämmen.</p><p>Nun haben Forscher der <a href="https://waldvogel.family/tags/ETH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETH</span></a> einen neuen Weg gefunden: Einige dieser "Branch Prediction"-Informationen werden vom Prozessor erst verzögert eingetragen.</p><p>Wenn genau in dieser Zeit in ein anderes Schutzniveau gewechselt wird, wird die Information falsch zugeordnet und kann missbraucht werden<br><a href="https://waldvogel.family/tags/ETHZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETHZ</span></a> <a href="https://waldvogel.family/tags/ETHZ%C3%BCrich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETHZürich</span></a> <a href="https://waldvogel.family/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a><br><a href="https://comsec.ethz.ch/research/microarch/branch-privilege-injection/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">comsec.ethz.ch/research/microa</span><span class="invisible">rch/branch-privilege-injection/</span></a></p>
Marcel Waldvogel<p>Vor gut 7 Jahren habe ich begonnen, komplexe IT-Phänomene für Nicht-Techies zu erklären zu versuchen.</p><p>Der Anlass damals war das Bekanntwerden der Prozessor-Sicherheitslücken <a href="https://waldvogel.family/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> und <a href="https://waldvogel.family/tags/Meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meltdown</span></a>. Damit konnte ein Angreifer Speicher (und die darin verborgenen Geheimnisse) auslesen, ohne die notwendigen Rechte zu besitzen.</p><p>Dazu musste *der Prozessor selbst*(!) ausgetrickst werden. Eine kleine Revolution!<br>🧵<br><a href="https://waldvogel.family/tags/MeltdownUndSpectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MeltdownUndSpectre</span></a> <br><a href="https://marcel-waldvogel.ch/2018/01/15/meltdown-und-spectre-lesen-ohne-zu-lesen/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marcel-waldvogel.ch/2018/01/15</span><span class="invisible">/meltdown-und-spectre-lesen-ohne-zu-lesen/</span></a></p>
Marcel SIneM(S)US<p>Perfekt implementierte Sicherungen ausgehebelt: <a href="https://social.tchncs.de/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a>-Angriffe sind zurück | Security <a href="https://www.heise.de/news/Perfekt-implementierte-Sicherungen-ausgehebelt-Spectre-Angriffe-sind-zurueck-10381851.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Perfekt-implemen</span><span class="invisible">tierte-Sicherungen-ausgehebelt-Spectre-Angriffe-sind-zurueck-10381851.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/TrainingSolo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrainingSolo</span></a></p>
theruran 💻 🌐 :cereal_killer:<p>"Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions"</p><p><a href="https://www.theregister.com/2025/05/13/intel_spectre_race_condition/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/05/13/int</span><span class="invisible">el_spectre_race_condition/</span></a><br>paper PDF: <a href="https://comsec.ethz.ch/wp-content/files/bprc_sec25.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">comsec.ethz.ch/wp-content/file</span><span class="invisible">s/bprc_sec25.pdf</span></a></p><p><a href="https://masto.hackers.town/tags/infoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoSec</span></a> <a href="https://masto.hackers.town/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://masto.hackers.town/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://masto.hackers.town/tags/BlackHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlackHat</span></a> <a href="https://masto.hackers.town/tags/USENIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USENIX</span></a></p>
David W. Jones<p>Thanks, Intel, for keeping up the tradition!</p><p>Devastating Spectre CPU bug returns to haunt Intel processors<br>Older PCs will run more slowly as a result of the patch. </p><p><a href="https://www.pcworld.com/article/2780652/spectre-cpu-bug-returns-to-haunt-intel-processors.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pcworld.com/article/2780652/sp</span><span class="invisible">ectre-cpu-bug-returns-to-haunt-intel-processors.html</span></a></p><p><a href="https://mastodon.social/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://mastodon.social/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>New Branch Privilege Injection (CVE-2024-45332) attack bypasses Intel’s Spectre-BTI mitigations via branch predictor race conditions, leaking memory at 5.6KiB/s on patched systems. Affects CPUs from 9th gen onward. Fix: microcode updates.</p><p><a href="https://comsec.ethz.ch/research/microarch/branch-privilege-injection/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">comsec.ethz.ch/research/microa</span><span class="invisible">rch/branch-privilege-injection/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intel</span></a> <a href="https://infosec.exchange/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a></p>
nemo™ 🇺🇦<p>Spectre-Angriffe sind zurück! 🕵️‍♂️ Selbst perfekt implementierte Sicherungen können umgangen werden. Sie sollten Ihre Systeme regelmäßig aktualisieren und wachsam bleiben. Mehr Infos bei heiseonline: <a href="https://www.heise.de/news/Perfekt-implementierte-Sicherungen-ausgehebelt-Spectre-Angriffe-sind-zurueck-10381851.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Perfekt-implemen</span><span class="invisible">tierte-Sicherungen-ausgehebelt-Spectre-Angriffe-sind-zurueck-10381851.html</span></a> <a href="https://mas.to/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://mas.to/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> 🔒 <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> </p><p>Kurzlink: <a href="https://heise.de/-10381851" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-10381851</span><span class="invisible"></span></a></p>
Attac 63<p>🚨Le dernier épisode du <a href="https://piaille.fr/tags/GrainDeSon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GrainDeSon</span></a> est disponible sur <a href="https://piaille.fr/tags/PeerTube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PeerTube</span></a> et <a href="https://piaille.fr/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> 🔴 </p><p>🎙️On termine le cycle sur "les avenirs en lutte", avec des militant·es LFI, @Solidaires63 et <span class="h-card" translate="no"><a href="https://piaille.fr/@attac63" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>attac63</span></a></span>.</p><p>▶️ ep5 : Lutte des classes<br>▶️ <a href="https://peertube.stream/w/8AgzDwHfoL6zXcvGDhzyNg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">peertube.stream/w/8AgzDwHfoL6z</span><span class="invisible">XcvGDhzyNg</span></a></p><p>dispo en <a href="https://piaille.fr/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> sur @SpectrePodcasts</p><p>🎧 <a href="https://spectremedia.org/le-grain-de-son/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">spectremedia.org/le-grain-de-s</span><span class="invisible">on/</span></a></p><p>et depuis notre site:</p><p>▶️ <a href="https://attac63.site.attac.org/podcasts/le-grain-de-son/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attac63.site.attac.org/podcast</span><span class="invisible">s/le-grain-de-son/</span></a> (rubrique)<br>▶️ <a href="https://attac63.site.attac.org/podcasts/le-grain-de-son/article/avenirs-en-lutte" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attac63.site.attac.org/podcast</span><span class="invisible">s/le-grain-de-son/article/avenirs-en-lutte</span></a></p><p><a href="https://piaille.fr/tags/Strat%C3%A9gies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stratégies</span></a> <a href="https://piaille.fr/tags/QueFaire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QueFaire</span></a> <a href="https://piaille.fr/tags/LutteDesClasses" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LutteDesClasses</span></a></p><p>^^ <span class="h-card" translate="no"><a href="https://mamot.fr/@Khrys" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Khrys</span></a></span></p>
Raurquiz<p><a href="https://c.im/tags/otd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>otd</span></a> <a href="https://c.im/tags/startrek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>startrek</span></a> <a href="https://c.im/tags/voyager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>voyager</span></a> <a href="https://c.im/tags/thethaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thethaw</span></a> <a href="https://c.im/tags/janeway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>janeway</span></a> <a href="https://c.im/tags/chakotay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chakotay</span></a> <a href="https://c.im/tags/tuvok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tuvok</span></a> <a href="https://c.im/tags/kim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kim</span></a> <a href="https://c.im/tags/paris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paris</span></a> <a href="https://c.im/tags/belannatorres" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>belannatorres</span></a> <a href="https://c.im/tags/kes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kes</span></a> <a href="https://c.im/tags/emh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emh</span></a> <a href="https://c.im/tags/neelix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>neelix</span></a> <a href="https://c.im/tags/Viorsa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Viorsa</span></a> <a href="https://c.im/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://c.im/tags/LittleWoman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LittleWoman</span></a> <a href="https://c.im/tags/TheClown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheClown</span></a> <a href="https://c.im/tags/startrek58" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>startrek58</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@trekcore" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>trekcore</span></a></span></p>