Explore >> Select a destination


You are here

cyber.wtf
| | berthub.eu
17.6 parsecs away

Travel
| | Comments are very welcome on bert@hubertnet.nl or @bert_hu_bert. Update: several constructive remarks have been used to improve this text. Thanks! In this post I will attempt to fully explain the Spectre and Meltdown vulnerabilities in an accessible way. I decided to write it up after I realised it took me more than a day to figure it out, even though I've been doing security related stuff on CPUs for 20 years.
| | membarrier.wordpress.com
12.7 parsecs away

Travel
| | In the previous post we saw how the memory management unit (MMU) uses page tables to translate virtual addresses into physical ones. We will now consider the various features that such a translation enables in an operating system. In the discussion below, it is important to remember that the granularity of translation is a single...
| | bvisness.me
18.5 parsecs away

Travel
| | An interactive explainer of Spectre, and my submission for the 2024 Handmade Learning Jam.
| | blog.talosintelligence.com
76.8 parsecs away

Travel
| ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns.