With control of the microcode, hackers can perform many sophisticated attacks, such as modifying the RDRAND instruction to generate fake random numbers, or even installing undetectable malware.
To aid in researching and fixing the vulnerability, Google has released zentool, an open-source 'cracking' toolkit that allows researchers to create, sign, and deploy custom microcode patches on vulnerable CPUs.
AMD responded quickly by releasing microcode updates that replaced the compromised authentication process with a custom secure hash function. Users are advised to update their CPU microcode to the latest version as soon as possible to protect their systems from potential attacks.
The EntrySign vulnerability is a reminder of the importance of ensuring hardware security, especially in the face of increasingly sophisticated cyberattacks.
linus henze, an 18-year-old german, recently claimed to have discovered a serious security flaw on macos that could expose the machine's storage passwords to malicious applications.
a critical flaw that was successfully discovered and patched in mid-2018 has been reported to reappear on cisco adaptive security (asa) and firepower devices.
according to securitybox, a network security company in vietnam, it is possible to penetrate important information systems of businesses, organized through micro chips.
this security flaw first appeared in february, and was later fixed by google via an update to the google chrome browser. however, this security hole has recently reappeared on chrome 67 and most likely has 'evolved' to be harder to destroy than before.
ios 13 will launch on september 19, but jose rodriguez, a security researcher, has discovered a flaw that allows hackers to bypass the lock screen on this version of ios.
recently, researchers at adaptivemobile security, based in dublin (usa), have discovered a security vulnerability called simjacker that could use users' own sim phones to track them. .
a serious security flaw affects some archer routers, which could allow potential attackers to control devices over a remote lan via a telnet connection without having to provide confidentiality. administrator password.
a report by websense, a security firm on december 4, said a flaw in quicktime's javascript handling combined with the vulnerability in myspace has inadvertently helped spread a new worm.