Ten chief information security officers from a variety of verticals will provide valuable insights to Dark Reading on what they see as the industry’s most pressing issues. Read More
Related Posts
Docker fixes critical 5-year old authentication bypass flaw
Docker fixes critical 5-year old authentication bypass flaw
Docker has issued security updates to address a critical vulnerability impacting certain versions of Docker Engine that could allow an attacker to bypass authorization plugins (AuthZ) under certain circumstances. […] Read More
![Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsD6LKdPcKWC46N-_BaaXZ29L0D7KphWMEbdicr1_7Yatd0mV1ryyXVkRdgJf12ZeUtbjMjsZ1gL-HSfF9zlxVSayKlyu6BzjHewf3GgU4jwaHJan42fatoQdSmRuH728-Sz1XusJcz8qymgTK8o0eB-9v4R1hn5MOrUvHi2UOm2O0WnBRbeimTNLO-oEt/s72-c/linux.png)
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
[[{“value”:”Cybersecurity researchers have disclosed what they say is the "first native Spectre v2 exploit" against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory.
The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB/sec by bypassing existing Spectre v2/BHI mitigations, researchers from Systems and”}]] Read More
The Hacker News | #1 Trusted Cybersecurity News Site
![Throwing Darts in the Dark With Microsoft Incident Response](https://thecyberwire.com/images/pages/MTI-Podcast.jpg?#)
Throwing Darts in the Dark With Microsoft Incident Response
Throwing Darts in the Dark With Microsoft Incident Response
On this week’s episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Stella Aghakian and Holly Burmaster. They explore the intrigue of watching threat actors and their techniques and walk through these techniques and how they are educational and critical in threat intelligence work. They also discuss their experiences at Microsoft Ignite, insights into the cyber threat actor Octo Tempest, and personal reflections on threat intelligence and favorite threat actors. Both Stella and Holly discuss how they thrive on the uncertainty and variety of their work despite the long hours and high pressure but appreciate the supportive team environment that helps them. Read More
The CyberWire