Short information for the weekend. On February 1, 2019, the U.S. National Security Agency (NSA) published updated guidelines on side-channel vulnerabilities.
First details about side-channel vulnerabilities in CPUs became known a year ago under the terms Meltdown and Spectre. In 2018, more variants of side-channel attacks were released. I became aware of this discussion via my Twitter channels.
WHAT BEGAN 2018? M&S FROM NSA, SPEED UP: SECURITY #1February
Thank You: @SBSDiva
ICYMI: @AskWoody @AdminKirsty @thurrott @maryjofoley @bdsams @mehedih_ @ruthm @SwiftOnSecurity @pcper @MalwareJake @GossiTheDog @tweet_alqamar @JobCacka @etguennihttps://t.co/rrYnRuVwkJ
— Crysta T. Lacey (@PhantomofMobile) 1. Februar 2019
On 1 February 2019, the US CERT has pointed out the following: The National Cybersecurity and Communications Integration Center (NCCIC), which is part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the NSA Cybersecurity Advisory. The National Security Agency (NSA) has published two documents on the subject:
Updated Guidance for Vulnerabilities Affecting Modern Processors
Hardware and Firmware Security Guidance GitHub website
Cookies helps to fund this blog: Cookie settings