Episode 369: Another Pass at Bypass




TechSNAP show

Summary: <p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p> <p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p><p>Sponsored By:</p><ul> <li> <a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li> <li> <a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li> <li> <a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li> </ul><p>Links:</p><ul> <li><a title="Security Flaw Impacts Electron-Based Apps" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/">Security Flaw Impacts Electron-Based Apps</a></li> <li><a title="Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/attackers-use-upnp-to-sidestep-ddos-defenses/131981/">Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news</a></li> <li><a title="Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext" rel="nofollow" href="https://thehackernews.com/2018/05/signal-desktop-hacking.html?m=1">Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext</a></li> <li><a title="Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/critical-linux-flaw-opens-the-door-to-full-root-access/132034/">Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news</a></li> <li><a title="Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/">Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register</a></li> <li><a title="Speculative Store Bypass explained: what it is, how it works" rel="nofollow" href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works">Speculative Store Bypass explained: what it is, how it works</a></li> <li><a title="TechSNAP Episode 351: Performance Meltdown" rel="nofollow" href="http://techsnap.systems/351">TechSNAP Episode 351: Performance Meltdown</a></li> <li><a title="Dave's Users flip the switch!" rel="nofollow" href="https://pastebin.com/LKVFaUYp">Dave's Users flip the switch!</a></li> <li><a title="Dave's War Story is really Screwy!" rel="nofollow" href="https://pastebin.com/tsfjKEhb">Dave's War Story is really Screwy!</a></li> <li><a title="Egon's Adventures in misslabled VMs" rel="nofollow" href="https://pastebin.com/wg4y034g">Egon's Adventures in misslabled VMs</a></li> </ul>