Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
CTSLabs has published a whitepaper outlining 13 critical vulnerabilities discovered in AMD processors. The vulnerabilities, classified under the names RyzenFall, Fallout, Chimera and MasterKey, affect AMD Secure Processors and AMD Ryzen Chipsets. CTSLabs states that if exploited, these vulnerabilities would allow attackers to install malicious code inside the Secure Processor, allow read and write access to protected memory areas, steal network credentials protected by Windows Credential Guard, cause physical damage to hardware and perform a variety of other malicious tasks. If their statement is accurate, this represents a critical and widespread security issue.
According to the whitepaper, successful exploitation requires local access with elevated privileges. eSentire has not observed any attacks in the wild and no proof of concept code has been identified .
Technical details for these vulnerabilities have not being released. As such, eSentire cannot attest to the validity of CTSLabs’ claims. In a statement, AMD was recently made aware of the issues and is currently investigating. Mitigating actions should be reserved until the findings and technical details have been confirmed by AMD.