ISS_5188_00768 (300 x 250)

The world of IT has just witnessed the most unsettling attack resulting from the rowhammer exploit. The exploit can flip individual bits in the memory of a computer.

The technique is so precise that it can allow a single machine to start stealing data from other machines that are hosted on the same cloud.

Until now, the Rowhammer exploit was considered a clumsy attack tool because it wasn’t really good enough to control where the data corrupting bits happened on a machine. Up till now, this attack was only considered a glitch until recently.

It is now capable of manipulating deduplication operations that are very common amongst cloud hosts to save memory.

Read more details

Jake Ciber

Jack of all trades... master of none... ABL... Always Be Learning! I love what I do and I love helping people.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.