❌

Reading view

There are new articles available, click to refresh the page.

MacBook Air gets hosed, other models hold steady in macOS 15 as Intel support fades

MacBook Air gets hosed, other models hold steady in macOS 15 as Intel support fades

Enlarge (credit: Aurich Lawson)

As the Intel Mac era has wound down over the last couple of years, we've been painstakingly tracking the amount of software support that each outgoing model is getting. We did this to establish, with over 20 years' worth of hard data, whether Intel Mac owners were getting short shrift as Apple shifted its focus to Apple Silicon hardware and to software that leveraged Apple Silicon-exclusive capabilities.

So far, we've found that owners of Intel Macs made in the mid-to-late 2010s are definitely getting fewer major macOS updates and fewer years' worth of security updates than owners of Intel Macs made in the late 2000s and early 2010s but that these systems are still getting more generous support than old PowerPC Macs did after Apple switched to Intel's processors.

The good news with the macOS 15 Sequoia release is that Apple is dropping very few Intel Mac models this year, a much-needed pause that slows the steady acceleration of support-dropping we've seen over the last few macOS releases.

Read 33 remaining paragraphs | Comments

The TIDE: UNC5537, SCARLETEEL, new Threat Object Stubs, and now 303 defensive solution mappings (our biggest release yet!)

In the latest edition of The TIDE: Threat-Informed Defense Education, we’re announcing new threat intelligence highlights, new direction for our Community Edition users, as well as the biggest release we’ve had yet of defensive technologies. It’s an exciting time at Tidal.

First up, I’m excited to share about Threat Object Stubs. In the past, if a user searched in Tidal Cyber Community Edition for an Enterprise Edition exclusive threat, they would have been left with the dreaded β€œno results.” Starting today, they will no longer see nothing, and instead see the threat object, its relationships to other objects, and references.

The post The TIDE: UNC5537, SCARLETEEL, new Threat Object Stubs, and now 303 defensive solution mappings (our biggest release yet!) appeared first on Security Boulevard.

Unlock Advanced Threat Correlation

Try the Enzoic + ThreatQ Integration Free on the ThreatQ Marketplace Exciting news for cybersecurity teams: Enzoic and ThreatQuotient have partnered to offer a powerful integration that combines Dark Web monitoring with advanced threat intelligence. And now, you can now try this integration for free on the ThreatQ marketplace, giving your organization a unique opportunity […]

The post Unlock Advanced Threat Correlation appeared first on Security Boulevard.

Intel unveils Lunar Lake architecture, moves RAM on-die

Hot on the heels of AMD, here’s Intel’s next-generation processor, this time for the laptop market.

Overall, Lunar Lake represents their second generation of disaggregated SoC architecture for the mobile market, replacing the Meteor Lake architecture in the lower-end space.Β At this time, Intel has disclosed that it uses a 4P+4E (8 core) design, with hyper-threading/SMT disabled, so the total thread count supported by the processor is simply the number of CPU cores, e.g., 4P+4E/8T.

↫ Gavin Bonshor at AnandTech

The most significant change in Lunar Lake, however, has nothing to do with IPC improvements, core counts, or power usage. No, the massive sea change here is that Lunar Lake will do away with separate memory sticks, instead opting for on-die memory at a maximum of 32GB LPDDR5X. This is very similar to how Apple packages its memory on the M dies, and yes, this also means that as far as thin Intel laptops go, you’ll no longer be able to upgrade your memory after purchase. You choose your desired amount of memory at purchase, and that’s what you’ll be stuck with.

Buyer beware, I suppose. We can only hope Intel isn’t going to default to 8GB.

Rapid7 Releases the 2024 Attack Intelligence Report

Rapid7 Releases the 2024 Attack Intelligence Report

Today, during our Take Command Summit, we released our 2024 Attack Intelligence Report, which pulls in expertise from our researchers, our detection and response teams, and threat intelligence teams. The result is the clearest picture yet of the expanding attack surface and the threats security professionals face every day.

Since the end of 2020, we’ve seen a significant increase in zero-day exploitation, ransomware attacks, and mass compromise incidents impacting many organizations worldwide. We have seen changes in adversary behaviors with ransomware groups and state-sponsored threat actors using novel persistence mechanisms and zero-day exploits to great effect.

Our 2024 Attack Intelligence Report is a 14-month look at data for marquee vulnerabilities and attack patterns. From it, we identified trends that are helpful for every security professional to understand.

Some key findings include:

A consistently high level of Β zero-day exploitation over the last three years. Since 2020, our vulnerability research team has tracked both scale and speed of exploitation. For two of the last three years, more mass compromise events have arisen from zero-day exploits than from n-day exploits. 53% of widely exploited CVEs in 2023 and early 2024 started as zero-day attacks. Β 

Network edge device exploitation has increased. Large-scale compromises stemming from network edge device exploitation has nearly doubled in 2023. We found that 36% of the widely exploited vulnerabilities we tracked occurred within network edge technology. Of those, 60% were zero day exploits. These technologies represent a weak spot in our collective defenses.

Ransomware is still big business. We tracked more than 5,600 ransomware attacks between January 2023 and February 2024. And those are the attacks we know about, as many attacks may go unreported for a number of reasons. The ones we were able to track indicated trends in attacker motive and behavior. For instance, we saw an increase in what we term β€œsmash-and-grab” attacks, particularly those involving file transfer solutions. A smash-and-grab attack sees adversaries gaining access to sensitive data and performing exfiltration as quickly as possible. While most ransomware incidents Rapid7 observed were still β€œtraditional” attacks where data was encrypted, smash-and-grab extortion is becoming more common.

Attackers are preferring to exploit simple vulnerability classes. While attackers still target tougher-to-exploit vuln classes like memory corruption, most of the widely exploited CVEs we have tracked over the last few years have arisen from simpler root causes. For instance, 75% of widespread threat CVEs Rapid7 has analyzed since 2020 have improper access control issues, like remotely accessible APIs and authentication bypasses, and injection flaws (like OS command injection) as their root causes.

These are just a few of the key findings in our 2024 Attack Intelligence report. The report was released today in conjunction with our Take Command Summit β€” a day-long virtual cybersecurity summit, of which the report features as a keynote. The summit includes some of the most impactful members of the security community taking part in some of the most critical conversations at this critical time. You can read the report here.

Xeon Phi support removed in GCC 15 compiler

Last week I wrote about Intel aiming to remove Xeon Phi support in GCC 15 with the products being end-of-life and deprecated in GCC 14. While some openly wondered whether the open-source community would allow it given the Xeon Phi accelerators were available to buy just a few years ago and at some very low prices going back years so some potentially finding use still out of them especially during this AI boom (and still readily available to buy used for around ~$50 USD), today the Intel Xeon Phi support was indeed removed.

↫ Michael Larabel

Xeon Phi PCIe cards are incredibly cheap on eBay, and every now and then my mouse hovers over the buy button – but I always realise just in time that the cards have become quite difficult to use, since support for them, already sparse to begin with, is only getting worse by the day. Support for them was already removed in Linux 5.10, and now GCC is pulling he plug too, so the only option is to keep using old kernels, or pass the card on to a VM running an older Linux kernel version, which is a lot of headache for what is essentially a weird toy for nerds at this point.

GCC 15 will also, sadly, remove support for Itanium, which, as I’ve said before, is a huge disgrace and a grave mistake. Itanium is the future, and will stomp all over crappy architectures like x86 and ARM. With this deprecation, GCC relegates itself to the dustbin of history.

❌