You are here |
cyber.wtf | ||
| | | |
berthub.eu
|
|
| | | | Comments are very welcome on bert@hubertnet.nl or @bert_hu_bert. Update: several constructive remarks have been used to improve this text. Thanks! In this post I will attempt to fully explain the Spectre and Meltdown vulnerabilities in an accessible way. I decided to write it up after I realised it took me more than a day to figure it out, even though I've been doing security related stuff on CPUs for 20 years. | |
| | | |
membarrier.wordpress.com
|
|
| | | | In the previous post we saw how the memory management unit (MMU) uses page tables to translate virtual addresses into physical ones. We will now consider the various features that such a translation enables in an operating system. In the discussion below, it is important to remember that the granularity of translation is a single... | |
| | | |
bvisness.me
|
|
| | | | An interactive explainer of Spectre, and my submission for the 2024 Handmade Learning Jam. | |
| | | |
blog.talosintelligence.com
|
|
| | ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. |