
Virtual-machine escape – in a Spectre v2 attack
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
5 articles
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Protecting a hybrid infrastructure from a single console
How to protect and control workloads in the AWS public cloud
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively