by David Fiser and William Gamazo Sanchez – Exploits for the notorious Meltdown and Spectre vulnerabilities may still just be working proofs of concept (PoC) or reportedly experimented on for now, but it’s only a matter of time before threat actors fully weaponize them. Meltdown and Spectre are pervasive, affecting machines built as early as 1995.
They can also be an especially thorny issue for enterprises under the purview of the EU General Data Protection Regulation (GDPR), for instance.
Apart from patching or updating the systems, it’s also important for organizations to establish more proactive strategies in hunting, detecting, and responding to threats, especially for those as rife as Meltdown and …
Lese weiter auf: Detecting Attacks that Exploit Meltdown and Spectre with Performance Counters
Quelle: TrendLabs Malware Blog
Kommentare und FragenMöchtest Du zu diesem Artikel ein Kommentar abgeben oder hast dazu eine Frage, dann mach dies bitte immer auf der Herausgeberseite!
Aktuelles von TrendLabs Malware Blog
- XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
- XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails
- Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
- Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware
- Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More
- Uncovering Unknown Threats With Human-Readable Machine Learning
- Microsoft’s April Patch Tuesday Fixes Remote Code Execution Vulnerabilities in Fonts and Keyboard
- Mirai-like Scanning Activity Detected From China, With Targets in Brazil
- Challenges in Securing Connected Hospitals
- Understanding Code Signing Abuse in Malware Campaigns