PLATYPUS: a new threat affecting Intel and AMD CPUs

PLATYPUS: a new threat affecting Intel and AMD CPUs

A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.

Open Source tools to protect enterprise networks

Open Source tools to protect enterprise networks

The protection of computer networks against unauthorized access is one of the main handicaps of cybersecurity. It is essential for both system administrators of large corporations and IT managers of small and medium-sized companies, even to protect home networks. In any of these cases personal data and sensitive information are at stake, whose value is priceless.

In this article we are going to talk about two Open Source tools with all the necessary ingredients to become your best allies to protect your networks from both external attacks and possible human errors: Apache Syncope and Apache Metron.

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing… It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.

Nearly 9 million cyber threats related to Covid-19 in 6 months

Nearly 9 million cyber threats related to Covid-19 in 6 months

During the first half of this year 2020, the security firm Trend Micro blocked 8.8 million cyber threats that took advantage of Covid-19 to infect computers. Spam through email was the main way used to carry out different types of fraud, accounting for almost 92% of the total.

This data comes from the report for the first six months of the year published by Trend Micro, which shows how cybercriminals changed their strategies since the beginning of the year to take advantage of the interest aroused by the pandemic around the world.

Lockdown security module bypass on Linux

Lockdown security module bypass on Linux

The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.

Skip to content