Intel adds CPU-level malware protection to Tiger Lake processors
Intel today announced a new CPU-level security capability known as Control-Flow Enforcement Technology (Intel CET) that offers protection against malware using control-flow hijacking attack methods on devices with Intel’s future Tiger Lake mobile processors. […]
Second Researcher Drops Router Exploit Code After D-Link Mishandles Bug Reports
Embedi, a hardware security firm, has published details about two vulnerabilities that have yet to be patched in the firmware of D-Link routers. This marks the second incident of this sort in the last five days. Last Friday, South Korean security researcher Pierre Kim also published public details about ten unpatched vulnerabilities in D-Link routers. […]
Three Hardcoded Backdoor Accounts Discovered in Arris Modems
Security researchers have found five gaping holes in the firmware running on Arris modems, three of which are hardcoded backdoor accounts. An attacker could use any of these three accounts to access and take over the device with elevated privileges — even root — install new firmware, and ensnare the modem in a larger botnet. […]
