<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ransomware Fighting CPUs in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42585#M235</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Intel also &lt;A href="https://www.securityweek.com/intel-packs-ransomware-detection-directly-vpro-platform" target="_blank" rel="noopener"&gt;announced&lt;/A&gt; at this years CES that It has entered a partnership with Israel-based Cybereason to help protect businesses against ransomware attacks. As part of the agreement, the cybersecurity company will develop new Intel "Hardware Shield protections" on the Intel Core vPro platform.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Intel is offering a&amp;nbsp;developer’s&amp;nbsp;kit and pre-written scripts for security vendors to use.The processors leverage data aggregated for performance improvements as a data source&amp;nbsp;that security products can then tap. While ransomware makers can try to&amp;nbsp;obfuscate&amp;nbsp;their processes&amp;nbsp;to operating system level controls, Intel reasons&amp;nbsp;it’s&amp;nbsp;nearly impossible&amp;nbsp;to hide&amp;nbsp;the processor activity&amp;nbsp;required&amp;nbsp;to perform bulk encryption of documents.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Jan 2021 02:46:50 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2021-01-18T02:46:50Z</dc:date>
    <item>
      <title>Ransomware Fighting CPUs</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42585#M235</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Intel also &lt;A href="https://www.securityweek.com/intel-packs-ransomware-detection-directly-vpro-platform" target="_blank" rel="noopener"&gt;announced&lt;/A&gt; at this years CES that It has entered a partnership with Israel-based Cybereason to help protect businesses against ransomware attacks. As part of the agreement, the cybersecurity company will develop new Intel "Hardware Shield protections" on the Intel Core vPro platform.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Intel is offering a&amp;nbsp;developer’s&amp;nbsp;kit and pre-written scripts for security vendors to use.The processors leverage data aggregated for performance improvements as a data source&amp;nbsp;that security products can then tap. While ransomware makers can try to&amp;nbsp;obfuscate&amp;nbsp;their processes&amp;nbsp;to operating system level controls, Intel reasons&amp;nbsp;it’s&amp;nbsp;nearly impossible&amp;nbsp;to hide&amp;nbsp;the processor activity&amp;nbsp;required&amp;nbsp;to perform bulk encryption of documents.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 02:46:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42585#M235</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2021-01-18T02:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware Fighting CPUs</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42598#M238</link>
      <description>We've been pushing the idea of hardware-based malware protection for over thirty&lt;BR /&gt;years, now, and so far every one of the "solutions" has been more trouble than it&lt;BR /&gt;is worth.&lt;BR /&gt;&lt;BR /&gt;I remember one early one that almost got me in BIG trouble. Not only did it&lt;BR /&gt;*not* keep a virus from infecting the machine, but, once the machine *did* get&lt;BR /&gt;infrected, the device actually prevented me from disinfecting it! (It was only the&lt;BR /&gt;shareware DISKSECURE utility that got me out of trouble.&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/pcdsksec.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/pcdsksec.rvw&lt;/A&gt; )&lt;BR /&gt;&lt;BR /&gt;Then there was Immunizer. Not only did Western Digital stiff me on doing the&lt;BR /&gt;review for them, but it was a really, really terrible product. (Their mess did,&lt;BR /&gt;though, significantly add to my virus "zoo.")&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/pcwdimmn.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/pcwdimmn.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I recall the "Trusted Computing Platform" initiative and group. Aside from&lt;BR /&gt;proposing that they have the power to determine who did what to a computer,&lt;BR /&gt;*any* computer, they also basically destroyed the concept of "trusted platform,"&lt;BR /&gt;which is still something you need to know for the exam.&lt;BR /&gt;&lt;BR /&gt;So, while I don't know all the details of this latest plan, I'm fairly sure they will&lt;BR /&gt;mess it up. (And history is on my side.)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;For I desire mercy, not sacrifice, and acknowledgment of God&lt;BR /&gt;rather than burnt offerings. - Hosea 6:6&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Mon, 18 Jan 2021 17:46:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42598#M238</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-01-18T17:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware Fighting CPUs</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42674#M247</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Intel unveiled new anti-&lt;/SPAN&gt;ransomware&lt;SPAN&gt;&amp;nbsp;capabilities for its 11&lt;/SPAN&gt;th&lt;SPAN&gt;&amp;nbsp;generation Core vPro&amp;nbsp;&lt;/SPAN&gt;processors&lt;SPAN&gt;, requiring little from security chiefs to reap the rewards. The&amp;nbsp;&lt;/SPAN&gt;processors&lt;SPAN&gt;&amp;nbsp;leverage data aggregated for performance improvements as a data source that security products can then tap.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://www.omegle.run/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;FONT color="#FFFFFF"&gt;Omegle&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 11:52:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-Fighting-CPUs/m-p/42674#M247</guid>
      <dc:creator>Darla526</dc:creator>
      <dc:date>2021-01-21T11:52:35Z</dc:date>
    </item>
  </channel>
</rss>

