Latest News

Read all latest blog posts

OpenBMC Remote OS Deployment: A Simplified Approach
November 17, 2024

OpenBMC Remote OS Deployment: A Simplified Approach

OpenBMC Remote OS Deployment: A Simplified Approach Many BMC implementations can accept a disk image and present it as a read-only USB mass storage device inserted into the host machine, allowing the host machine to boot from this “disk” for remote installation of the operating system or maintenance tasks.

Read More
The magic about how modern OS boot
September 13, 2022

The magic about how modern OS boot

Linux kernel Under x86/amd64 architecture, Linux kernel is usually packed into bzImage format, which contains a partially-filled data structure for boot parameter, and multiple entry points of stages for 16-bit real mode, 32-bit protected mode, and 64-bit long mode if built for amd64, the last stage is a self-decompressing flat binary, which will decompress and execute the gzip-compressed kernel image proper, also in the format of flat binary, stored in its data segment.

Read More
Technical analysis of syzkaller based fuzzers: It's not about VaultFuzzer!
August 7, 2022

Technical analysis of syzkaller based fuzzers: It's not about VaultFuzzer!

0. VaultFuzzer S0rry, VaultFuzzer is not the main player today. We’re going have little ride with Harbian-QA and GREBE today.

Read More
Next Generation Data Center Security: The Cornerstone of Web3?
August 5, 2022

Next Generation Data Center Security: The Cornerstone of Web3?

0. Next generation data center What is the next generation data center?

Read More
VaultBoot: Attestation as a Service
June 27, 2022

VaultBoot: Attestation as a Service

VaultBoot In the highest level of security profile (CRITICAL), the Vault 111 hardware node enables multi-trust anchors through the chip security features.

Read More
VED (Vault Exploit Defense): Open source implementation
June 16, 2022

VED (Vault Exploit Defense): Open source implementation

VED - Linux kernel threat detection and prevention system LKM version of VED goes public finally.

Read More
Tetragon: case study of security product's self-protection
May 25, 2022

Tetragon: case study of security product's self-protection

Story background CTO of cloud-native security company Isovalent announced that their eBPF-based Security Observability and Runtime Enforcement solution Tetragon ( WayBackMachine 20220516 ) become open source after years of development in May 16 2022.

Read More
Exploiting CVE-2021-26708 (Linux kernel) with sshd
March 1, 2022

Exploiting CVE-2021-26708 (Linux kernel) with sshd

Kernel vulnerability CVE-2021-26708 Alexander Popov has published an article Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel which use a four-byte overwrite vulnerability to do privilege escalation.

Read More
Intel SGX deprecation review
January 15, 2022

Intel SGX deprecation review

The rumors about Intel SGX deprecated in new processors has been confirmed, 12th generation processors (Workstation/Desktop/Laptop/embedded platforms) will deprecate SGX and the SGX will continue to support only in high-end Xeon CPU for server:

Read More
Risk analysis of Log4Shell (CVE-2021-44228) and mitigation
December 17, 2021

Risk analysis of Log4Shell (CVE-2021-44228) and mitigation

Risk analysis of Log4Shell (CVE-2021-44228) and mitigation Log4Shell is a high impact exploitable bug in Java logging framework logj4.

Read More