----------------------------------------------------------------------------------
@MSGID: 2:467/888.188 66d97dda
Cybersecurity researchers from ETH Zurich have developed a new variant of
the RowHammer DRAM (dynamic random-access memory) attack that, for the
first time, successfully works against AMD Zen 2 and Zen 3 systems
despite mitigations such as Target Row Refresh (TRR). "This result
proves that AMD systems are equally vulnerable to Rowhammer as intel
systems, which greatly increases the
https://thehackernews.com/2024/03/new-zenhammer-attack-bypasses-rowhammer.html
2024-03-28 19:50:00+05:30
________________________________
--- UA.HACKER - твiй помiчник у сферi кiбербезпеки | читай ще +SECURITY +UA.IT
* Origin: Читай нас за допомогою
http://winpoint.org (2:467/888.188)
SEEN-BY: 463/68 877 1331 467/4 888 5001/100
5005/49 5015/255 5019/40 5020/848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5060/900
5061/133 5075/128
@PATH: 467/888 5020/1042 4441