ARM
Apple M-Series FAIL: GoFetch Flaw Finds Crypto Keys
Richi Jennings | | Apple, apple bug, Apple Data Security, apple hack, apple hacker, Apple iOS, Apple iPad, ARM, cache, dmp, GoFetch, iPad, M1, M2, M3, Macintosh, macos, SB Blogwatch
GoFAIL: Researchers worm their way into broken cache-filling microcode in most Macs and iPads ...
Security Boulevard
#iLeakage: All Apple CPUs Vulnerable — No Patch in Sight
Richi Jennings | | Apple Safari, ARM, Daniel Genkin, iLeakage, ios, macos, mobile safari, Safari, SB Blogwatch, Spectre, speculative execution, Webkit, WebKit engine
Son of Spectre: No fix for iOS, “unstable” workaround for macOS ...
Security Boulevard
Broken ARM: Mali Malware Pwns Phones
Richi Jennings | | android, ARM, CVE-2023-33200, CVE-2023-34970, CVE-2023-4211, GPU, hardware supply chain, Linux, Mali, open source software supply chain, SB Blogwatch, software supply chain, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks
Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver ...
Security Boulevard
Apple M1 Flaw Can’t be Fixed — PACMAN Panic
Richi Jennings | | Apple, ARM, M1, PACMAN, SB Blogwatch, speculative execution, Yo dawg we heard you had a vulnerability mitigator so we designed a vulnerability to mitigate your vulnerability mitigator
Apple’s M1 chip isn’t as safe from buffer overflows as previously thought. M1 and other designs based on ARMv8.3 can have their ‘PAC’ protection neutered ...
Security Boulevard
Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons
The government of the United Kingdom is investigating the proposed “merger” of ARM and Nvidia, on national security grounds ...
Security Boulevard
A Hacker’s Tour of the X86 CPU Architecture
Travis Phillips | | analysis, Apple, architecture, ARM, cpu, eflags, Endian, M1, payload, Penetration Testing, Professionally Evil, Registers, Reverse Engineering, Reviews, Secure Ideas, segments, shellcode, x86
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers. While other architectures exist and are even taking some market share with mobile ...
Solving the November 13th Detective Nevil Mystery Challenge
Travis Phillips | | .gdb, ARM, ASM, challenge, debug, debugging, Detective Nevil Mystery Challenge, Linux, payload, Penetration Testing, Professionally Evil, programming, Pwntools, Reverse Engineering, Write-up
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th of 2020, we released a challenge that contained a payload and it ...
Solving the November 13th Detective Nevil Mystery Challenge
Travis Phillips | | .gdb, ARM, ASM, challenge, debug, debugging, Detective Nevil Mystery Challenge, Linux, payload, Penetration Testing, Professionally Evil, programming, Pwntools, Reverse Engineering, Write-up
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th of 2020, we released a challenge that contained a payload and it ...
Arm Bolsters IoT Security Testing
Arm, in collaboration with a variety of testing partners, has announced a series of certifications intended to make sure internet of things (IoT) platforms built using its processors are secure. In 2017 ...
Security Boulevard