<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Heads up: New speculative execution bugs in the pipeline in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Heads-up-New-speculative-execution-bugs-in-the-pipeline/m-p/5378#M579</link>
    <description>&lt;P&gt;The colleague who pointed me to this is thinking it may be a hoax. I certainly hope so, but it is better to wait and see at this point, given the recent issues. Hope for the best, plan for the worst and all of that.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jan 2018 17:35:43 GMT</pubDate>
    <dc:creator>Badfilemagic</dc:creator>
    <dc:date>2018-01-18T17:35:43Z</dc:date>
    <item>
      <title>Heads up: New speculative execution bugs in the pipeline</title>
      <link>https://community.isc2.org/t5/Industry-News/Heads-up-New-speculative-execution-bugs-in-the-pipeline/m-p/5377#M578</link>
      <description>&lt;P&gt;Details are almost non-existant as the bugs are currently embargoed. However, it appears that there are a pair of additional attacks taking advantage of speculative execution issues in CPUs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are branded as Skyfall and Solace, which will, of course, making playing "Bond Movie or Branded CVE" more difficult. The page to watch is here:&amp;nbsp;&lt;A href="https://skyfallattack.com" target="_blank"&gt;https://skyfallattack.com&lt;/A&gt;, so we'll see how this unfolds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If, like the last two, these are really just read-only attacks then at least that is something. However, depending on difficulty and reliability of the exploit, I expect that cloud providers will once again provide the juiciest attack surface.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 16:38:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Heads-up-New-speculative-execution-bugs-in-the-pipeline/m-p/5377#M578</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-18T16:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Heads up: New speculative execution bugs in the pipeline</title>
      <link>https://community.isc2.org/t5/Industry-News/Heads-up-New-speculative-execution-bugs-in-the-pipeline/m-p/5378#M579</link>
      <description>&lt;P&gt;The colleague who pointed me to this is thinking it may be a hoax. I certainly hope so, but it is better to wait and see at this point, given the recent issues. Hope for the best, plan for the worst and all of that.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 17:35:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Heads-up-New-speculative-execution-bugs-in-the-pipeline/m-p/5378#M579</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-18T17:35:43Z</dc:date>
    </item>
  </channel>
</rss>

