this post was submitted on 19 Oct 2024
58 points (100.0% liked)

Cybersecurity

5687 readers
68 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

he latest generations of Intel processors, including Xeon chips, and AMD's older microarchitectures on Linux are vulnerable to new speculative execution attacks that bypass existing ‘Spectre’ mitigations.

you are viewing a single comment's thread
view the rest of the comments
[–] user@lemmy.one 13 points 1 month ago (1 children)

Laughs in Zen 3..... For now 🫠

[–] scrion@lemmy.world 7 points 1 month ago (1 children)

From the article:

AMD also confirmed the vulnerability and said that the flaw had already been documented and tracked as CVE-2022-23824. It is worth noting that AMD’s advisory includes Zen 3 products as beeing affected, which are not listed in ETH Zurich’s paper.

[–] user@lemmy.one 8 points 4 weeks ago* (last edited 4 weeks ago)

😱🔫.... Cries in Zen 3